Help Net Security
Why everyone should care about two-factor authentication
In the age of BYOD, corporate employees and consumers alike have access to incredible computing power in the palms of their hands. With almost our entire digital lives …
Consumers increasingly adopting personal security measures
With the increase of personal data being stored on mobile devices, a new survey showed that 61 percent of wireless consumers use PINs/passwords, up 20 percent from the survey …
1 in 4 organizations have experienced an APT
A new ISACA study found that more than one in four (28%) have already experienced an APT attack.The study found that mobile device security continues to lag at many …
Secret code in color printers enables government tracking
A research team led by the EFF recently broke the code behind tiny tracking dots that some color laser printers secretly hide in every document.The U.S. Secret Service …
UK workers are significantly lacking in security awareness
A new study has revealed that the majority of UK workers are not Cyber Savvy and have failed a Cyber IQ test, which was compiled by experts from ESET.Study participants were …
Internet of Things: Rethinking privacy and information sharing
It is hard to imagine a world where the Internet of Things (IoT) is our collective “normal” – when our interaction with devices around us is so embedded in our lives, how we …
Week in review: WiFi jamming, Flash zero-day actively exploited, and abusing the Internet of Things
Here’s an overview of some of last week’s most interesting news and articles:WiFi jamming attacks more simple and cheaper than everA security researcher has …
Safeguarding data in the healthcare industry
Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, new research from IS Decisions has revealed. Despite …
We’ve been hacked! Okay, I’ll deal with it next week
That was the message I got from a CEO when we presented evidence that their organization had been compromised and the attackers had been free to roam for months, resulting in …
How boards calibrate strategy and risk
Corporate boards are deepening their involvement in company strategy and refining their oversight of the critical risks facing the company, according to a recent global survey …
Cyber liability insurance is becoming an increasing necessity
According to Ken Westin, senior security analyst at Tripwire, cyber liability insurance is becoming an increasing necessity for businesses and could easily become a …
Exposing the most dangerous financial malware threats
Cyphort analyzed the top eight types of financial malware cybercriminals are using today to target banks and electronic payment systems.The most dangerous financial malware …
Featured news
Resources
Don't miss
- Salesforce Gainsight compromise: Early findings and customer guidance
- Research shows identity document checks are missing key signals
- How one quick AI check can leak your company’s secrets
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks