Help Net Security
Best practice application security: Does it exist?
Unfortunately and unsurprisingly, website breaches have become an everyday occurrence. In fact, hacked websites have become so common that typically only the biggest data …
Malicious advertisements surge! 260% spike in 2015
“RiskIQ announced at Black Hat USA 2015 its latest findings on the prevalence of malvertising across the nearly two billion publisher pages and 10 million mobile apps it …
What’s the state of your software?
Cybercrime is felt by businesses up and down the country, with the Information Security Breaches Survey (ISBS) reporting that 81 per cent of large and 60 per cent of small …
The leading cause of insider threats? Employee negligence
Employee negligence, which may be caused by multitasking and working long hours, can result in insider threats and cost companies millions of dollars each year. It can cost a …
The rapid growth of the bug bounty economy
On average, nearly five high-to-critical priority vulnerabilities are found within the lifetime of a single program, according to Bugcrowd.Another observed trend includes the …
Cyber insurance market to hit US$10 billion by 2020
Continued and sustained cyberattacks are having a ruinous effect on enterprises and driving up the cost of incident response. With over 900 million reported records exposed in …
Week in review: Windows 10 security features, and thwarting user profiling based on typing behavior
Here’s an overview of some of last week’s most interesting news and articles:Over 5,000 mobile apps found performing in-app ad fraudOf the $20 billion projected to …
User behavior analytics for security operations efficiency
So, you’ve been informed by the FBI, a business partner, or security consultant that they have spotted a bunch of your company’s employee records on the paste bin website. …
Microsoft Edge: New browser, new risks for Windows 10
Microsoft Edge, the new browser in Windows 10, represents a significant increase in the security over Internet Explorer. However, there are also new potential threat vectors …
Cybercriminals are preying on existing vulnerabilities to plan future attacks
Solutionary performed a broad analysis of the threat landscape, which unearthed several key findings. They identified several campaigns targeting the bash vulnerability during …
List of approved Windows 10 compatible security products
Windows 10 is now available to users around the world, and it comes with new security features.AV-Comparatives tested a variety of software titles to see which of them are …
Cloud encryption and tokenization trends in financial services
The adoption of the cloud continues to grow rapidly with Gartner forecasting $282 billion in spending by 2018.“As financial services adopt the cloud, strict compliance …
Featured news
Resources
Don't miss
- Life, death, and online identity: What happens to your online accounts after death?
- OpenFGA: The open-source engine redefining access control
- For blind people, staying safe online means working around the tools designed to help
- 3 DevOps security pitfalls and how to stay ahead of them
- CISA warns of Windows SMB flaw under active exploitation (CVE-2025-33073)