Help Net Security
Are you ready for EMV?
As retailers and banks prepare for the October 1 EMV liability shift—which moves fraud liability from issuing banks to merchants —many consumers have not yet received their …
Reactions to the XcodeGhost malware infecting iOS apps
“Unknown malware pushers have managed to trick Apple into offering for download from the company’s official App Store a considerable number of malicious apps. Here …
Malware-infected game discovered on Google Play, up to 1 million users at risk
Check Point researchers found sophisticated new malware on Google Play which has infected between 200,000 and 1 million users. The malware is packaged within an Android game …
26 vulnerabilities found in parental monitoring application
A new Citizen Lab report details results of two independent audits of the privacy and security of Smart Sheriff, a parental monitoring application that has been promoted by …
The average budget required to recover from a security breach
The average budget required to recover from a security breach is $551,000 USD for enterprises, and $38,000 for small and medium businesses according to Kaspersky Lab.Based on …
Why improving cyber resilience is key
75 percent of U.S. organizations are not prepared to respond to cyberattacks, leaving them more vulnerable than ever against increasing intensity and volume of security …
Cyber risk still poorly communicated to C-suite executives
Cyber risk continues to be poorly communicated to C-suite executives, according to Auriga Consulting. The monopolisation of the risk management function by IT and security …
Week in review: Malicious Cisco router implants, .onion becomes a special-use domain name, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, reviews and articles:(IN)SECURE Magazine issue 47 released(IN)SECURE Magazine is a free digital …
Data security for the borderless enterprise
With the advent of cloud computing, social media and mobility, data is moving and proliferating at pace across borders, platforms and applications, very rarely staying within …
Information security: A key issue in the 2016 U.S. presidential campaign?
As the number and scale of data breaches continue to grow, cybersecurity issues are becoming part of our national discourse. The topic is already a key issue for the 2016 …
State-sponsored cyberattacks linked to Russian intelligence gathering
F-Secure Labs linked a number of state-sponsored cyberattacks to a hacking group engaged in Russian intelligence gathering. Specific targets of the attacks include the former …
Top cloud security issue? Lack of visibility
Lack of visibility into cloud deployments and associated provider security practices and controls is a source of major dissatisfaction amongst IT professionals, according to …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does