Help Net Security
Buhtrap gang distributes malware through Ammyy’s remote desktop software
ESET has uncovered several examples of malware being distributed via a strategic web compromise. Recently, visitors to ammyy.com were offered a bundle containing not only the …
Three indicted in largest theft of customer data from a U.S. financial institution in history
On Tuesday, federal prosecutors unsealed a superseding indictment charging Gery Shalon, Joshua Samuel Aaron and Ziv Orenstein with orchestrating massive computer hacking …
Long-term skills shortage drives tech salaries up
Four in 10 technologists changed jobs this year, according to the Harvey Nash Technology Survey. Respondents listed a good salary as their main motivator (77 percent) behind …
How the threat landscape will change by 2020
McAfee Labs’ five year look ahead attempts to predict how the types of threat actors will change, how attackers’ behaviors and targets will change, and how the industry …
6.4 billion connected things will be in use in 2016
Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020. In 2016, 5.5 million new …
Key developments on the cyber threat landscape in 2016
Reflecting the informed opinions of 33 of Intel Security’s thought leaders, a new report examines current trends in cybercrime and makes predictions about what the future may …
Most companies don’t believe their information security meets their organization’s needs
More than one-third (36%) of global organizations still lack confidence in their ability to detect sophisticated cyber attacks, according to EY.The survey of 1,755 …
Exposing Rocket Kitten cyber-espionage group operations and targets
Check Point identified specific details and analyzed cyber-espionage activity conducted by the group Rocket Kitten, with possible ties to the Iranian Revolutionary Guard …
Information security and privacy are crucial for EU growth
The EU has to establish cyber trust among citizens and industry to create a competitive EU based ICT sector, further strengthening the EU position, and at the same time …
Stolen or lost devices and the risks of remote working
44 percent of organizations believe a member of their senior management has lost a mobile device in the last year, whilst 39 percent say senior management had a device …
Cox Communications to pay $595,000 for data breach
The Federal Communications Commission’s Enforcement Bureau has entered into a $595,000 settlement with Cox Communications to resolve an investigation into whether the company …
Evading cyber legislation: Jurisprudence cloaking is the future of cyber warfare
When is an IP address not actually the person, country of origin or device you thought? From Klingons, to Harry Potter, to Xbox Halo’s Master Chief, the world has dreamt up …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)