Help Net Security
Top IoT concerns? Data volumes and network stress
The scaling out to many thousands of devices per organization represents a wealth of new opportunities, according to a report by Quocirca. However, the same security rigor and …
Retailers are unaware of sensitive data leaks
A significant amount of retailers assign the same login credentials to employees and do not know if employees have leaked sensitive data – in spite of the majority …
Exploring the North American cybercriminal underground
Unlike counterparts in other countries, the North American underground encourages cybercriminal activity amongst novices and seasoned pros alike, according to Trend Micro.“The …
100,000 laptops and phones left in UK bars each year
UK bars guzzle up a staggering 138,000 mobile phones and laptops each year, and alarmingly 64 percent of the devices do not have any security protection installed, which means …
First ever EU rules on cybersecurity
Transport and energy companies will have to ensure that the digital infrastructure that they use to deliver essential services, such as traffic control or electricity grid …
How will billions of devices impact the Privacy of Things?
The Internet of Things (IoT) will create the single largest, most chaotic conversation in the history of language. Imagine every human being on the planet stepping outside and …
(IN)SECURE Magazine issue 48 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 48 has been released today.Table of contents: Ivan …
Tips for managing and securing SSH keys
A new NIST report raises awareness of the major vulnerabilities associated with SSH user key management and provides concrete steps for securing and protecting SSH systems and …
Strong passwords don’t matter if employees don’t secure them
The line between personal and professional use of apps and devices continues to blur, and while employees claim to prioritize online security, data fro Ping Identity shows …

Exposed: New toolset of the Sofacy cyber-espionage group
Kaspersky Lab has spotted new attacks by the Sofacy group which make use of several upgraded techniques designed for aggressive persistency and greater invisibility of …
Week in review: Information the FBI can collect with NSLs revealed, VPN protocol flaw gives away users’ true IP address
Here’s an overview of some of last week’s most interesting news and articles:Human element of security to the fore at IRISSCON 2015Training people to take more …
Keeping your business secure this holiday season
2015 is coming to a close, but as employees prepare for the holiday season and the new year, cyber criminals aren’t taking a break and are looking for opportunities to take …
Featured news
Resources
Don't miss
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers