Help Net Security
Week in review: Dell computers shipped with root CA cert and private key, analytics services tracking users via Chrome extensions
Here’s an overview of some of last week’s most interesting news and articles:Four ways an attacker can infiltrate an organization by diverting security …
Production freeze: Prevent, detect, correct
As we enter the Christmas shopping season, many retail organisations go into a “production freeze” where they halt updates and configuration changes in their payment and order …
Five big technology predictions into 2016
1. Security will be the biggest issue in the ICT industry driven by rapid adoption of Cloud, Mobility and the Internet of Things As platforms become more open due to the rapid …
Linux crypto ransomware continues to wreak havoc, but there’s some good news
Trojan Encoder crypto ransomware family, whose main target are web servers running on Linux, is obviously making quite a splash. Dr. Web, the security company that first …
GPS faker software broadcasts spam across thousands of fake profiles
Different from traditional email spam, social spam can reach a large audience by nature of the platform and can appear trustworthy since it is coming from people in your …
IBM cloud tool enables privacy-preserving user authentication
Identity Mixer, a new tool to protect a consumer’s personally identifiable information, is now generally available on IBM Cloud. The tool is built on years of cryptography …
Four ways an attacker can infiltrate an organization by diverting security solutions
Employing one of the many security solutions on the market today does not mean your organization is immune to infiltration – that much is clear from the constant string …
IoT attacks and evasion techniques will characterize threats in 2016
As in years past, the Internet of Things and cloud play heavily in the predictions but new malicious tactics and strategies will create unique challenges for vendors and …
ModPOS: The most sophisticated POS malware to date
Elements of ModPOS date back as far as early 2012. It targeted US retailers in late 2013 and throughout 2014, and is expected to continue to do so in the future. According to …
Five ransomware safety tips for online retailers
Cybercriminals have developed a destructive new form of ransomware that targets online retailers. They scan websites for common vulnerabilities and use them to install malware …
Remote working on the rise despite security concerns
Remote working is increasing in popularity as 96 percent of surveyed organisations now permit remote/mobile working, with 98 percent stating that it is advantageous to their …
The current wave of data protection regulations and how it will affect the infosec industry
In 2016, the EU is set to review the next draft of The Network and Information Security (NIS) ‘cybersecurity’ directive which will bring new compliance requirements into …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits