Help Net Security
What a business leader should know about the cloud and its impact
Great companies see business risks as opportunities, and execute strategies accordingly. Such a mentality is compatible with emerging technologies. IT plays a vital role in …
Never underestimate the impact of a data breach
The growth of cyber-crime and the impact of successful attacks on an organization’s bottom-line should not be underestimated; it is anticipated that data breaches will …
Why location-based social media data is critical for security
Sports games at stadiums, hurricanes along the coast, protests on city streets, guest complaints at hotels, customer praise at restaurants, bullying at schools… Things happen …
We don’t know what we don’t know
Citing the latest cyber security statistics is a popular way for security companies to show that they are keeping a watchful eye on the threat landscape. Where does the …
Flaw allows hijacking of professional surveillance AirLive cameras
Nahuel Riva, a research engineer from Core Security, discovered vulnerabilities in AirLive’s surveillance cameras designed for professional surveillance and security …
Hackers targeting users of Barclays, Royal Bank of Scotland, HSBC, Lloyds Bank and Santander
19,000 malicious emails have been sent in three days from spam servers worldwide, inviting users to download an archive containing a malicious .exe file. Bitdefender warns …
Reactions to the Hacking Team breach
Hacking Team, the (in)famous Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies around the …
Man gets 50 months in prison hacking U.S.-based financial institutions
Qendrim Dobruna, a member of an international cybercrime syndicate, was sentenced to 50 months’ imprisonment and restitution in the amount of $14 million for his role in …
The best way to prevent data breaches? It’s not what you think
Data security breaches seem to be popping up almost daily. From the 2015 IRS breach, to the hacking of federal government employees’ data by China, it’s clear much of our most …
Week in review: Popular VPNs leaking data, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles:5 ways to stop the Internet of Things from becoming the Internet of ThievesThis is the …
You’ve been breached, now what?
Everybody tends to think that hackers will never ever target them or their company/organization until a breach occurs. This article concentrate on post-incident actions and …
The top three banking malware families
“The primary motivator behind banking malware attacks is to capture credentials, financial data, and personal information from employees, and partner company employees, …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption