Help Net Security
How the threat landscape will change by 2020
McAfee Labs’ five year look ahead attempts to predict how the types of threat actors will change, how attackers’ behaviors and targets will change, and how the industry …
6.4 billion connected things will be in use in 2016
Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020. In 2016, 5.5 million new …
Key developments on the cyber threat landscape in 2016
Reflecting the informed opinions of 33 of Intel Security’s thought leaders, a new report examines current trends in cybercrime and makes predictions about what the future may …
Most companies don’t believe their information security meets their organization’s needs
More than one-third (36%) of global organizations still lack confidence in their ability to detect sophisticated cyber attacks, according to EY.The survey of 1,755 …
Exposing Rocket Kitten cyber-espionage group operations and targets
Check Point identified specific details and analyzed cyber-espionage activity conducted by the group Rocket Kitten, with possible ties to the Iranian Revolutionary Guard …
Information security and privacy are crucial for EU growth
The EU has to establish cyber trust among citizens and industry to create a competitive EU based ICT sector, further strengthening the EU position, and at the same time …
Stolen or lost devices and the risks of remote working
44 percent of organizations believe a member of their senior management has lost a mobile device in the last year, whilst 39 percent say senior management had a device …
Cox Communications to pay $595,000 for data breach
The Federal Communications Commission’s Enforcement Bureau has entered into a $595,000 settlement with Cox Communications to resolve an investigation into whether the company …
Evading cyber legislation: Jurisprudence cloaking is the future of cyber warfare
When is an IP address not actually the person, country of origin or device you thought? From Klingons, to Harry Potter, to Xbox Halo’s Master Chief, the world has dreamt up …
Evading cyber legislation: Jurisprudence cloaking is the future of cyber warfare
When is an IP address not actually the person, country of origin or device you thought? From Klingons, to Harry Potter, to Xbox Halo’s Master Chief, the world has dreamt up …
The transformative technology security nightmare
They say that every silver lining comes with a cloud attached and that’s certainly true of today’s transformative technologies. CEOs and the board rightly see BYOD, Cloud and …
Guide to application whitelisting
The National Institute of Standards and Technology (NIST) has published a guide to deploying automated application whitelisting to help thwart malicious software from gaining …