Help Net Security
Internet of Things: Rethinking privacy and information sharing
It is hard to imagine a world where the Internet of Things (IoT) is our collective “normal” – when our interaction with devices around us is so embedded in our lives, how we …
Week in review: WiFi jamming, Flash zero-day actively exploited, and abusing the Internet of Things
Here’s an overview of some of last week’s most interesting news and articles:WiFi jamming attacks more simple and cheaper than everA security researcher has …
Safeguarding data in the healthcare industry
Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, new research from IS Decisions has revealed. Despite …
We’ve been hacked! Okay, I’ll deal with it next week
That was the message I got from a CEO when we presented evidence that their organization had been compromised and the attackers had been free to roam for months, resulting in …
How boards calibrate strategy and risk
Corporate boards are deepening their involvement in company strategy and refining their oversight of the critical risks facing the company, according to a recent global survey …
Cyber liability insurance is becoming an increasing necessity
According to Ken Westin, senior security analyst at Tripwire, cyber liability insurance is becoming an increasing necessity for businesses and could easily become a …
Exposing the most dangerous financial malware threats
Cyphort analyzed the top eight types of financial malware cybercriminals are using today to target banks and electronic payment systems.The most dangerous financial malware …
Exposing the most dangerous financial malware threats
“Cyphort analyzed the top eight types of financial malware cybercriminals are using today to target banks and electronic payment systems. The most dangerous financial …
Top 3 trends in today’s threat landscape
Every day there seems to be a new malware threat that we hear about, from remotely controlling cars and medical equipment, to attacks on well-known security vendors such as …
Prices of stolen data on the Dark Web
Over the years, the McAfee Labs team has worked with IT security vendors, law enforcement and others to identify and evaluate numerous websites, chat rooms, and other online …
Existing security standards do not sufficiently address IoT
A lack of clarity and standards around Internet of Things (IoT) security is leading to a lack of confidence.According to the UK IT professionals surveyed by ISACA, 75 percent …
Cyberattacks will cost U.S. health systems $305 billion
Cyberattacks over the next five years will cost U.S. health systems $305 billion in cumulative lifetime revenue. Accenture estimates that one in 13 patients – roughly 25 …
Featured news
Resources
Don't miss
- GitHub project maintainers targeted with fake security alert
- Pay, fight, or stall? The dilemma of ransomware negotiations
- Review: Cybersecurity Tabletop Exercises
- IntelMQ: Open-source tool for collecting and processing security feeds
- Quantifying cyber risk strategies to resonate with CFOs and boards