Help Net Security
How to survive a compliance audit
Ipswitch polled 313 IT professionals in United States with 59 percent noting that they were not fully prepared to undergo an audit. Additionally, 75 percent of respondents …
Nigerian scammers are stealing millions from businesses
When someone mentions advanced fee or romance scams most people immediately associate them with Nigerian scammers. But there is another type of scam that these fraudsters …
Hackers are spending a huge amount of resources targeting financial services
Websense revealed a high degree of specialization among criminals attacking financial services, a huge investment in the lure attack phase and the specific and anomalous …
Businesses know about POS security risks, but are they investing wisely?
The majority of organizations have increased their POS security budgets during the last two years, but many of them are still using and investing in outdated technologies, …
Three simple ways to prevent a data breach
With methods of cybercrime rapidly evolving, the number of headline-making data breaches continues to grow. Unfortunately, it has become clear that even advanced security …
The downfall of a major cybercrime ring exploiting banking Trojans
“A joint investigation team (JIT) consisting of investigators and judicial authorities from six different European countries, supported by Europol and Eurojust, has …
Instapaper for Android vulnerable to man-in-the-middle attacks
Bitdefender researchers have discovered that Android app Instapaper is vulnerable to man-in-the-middle attacks that could expose users’ signup/login credentials when logging …
Who fixes the most vulnerabilities?
Web and mobile applications produced or used by government organizations are more likely than those in other industries to fail standard security policies like the OWASP Top …
How lack of trust and limited knowledge impact your organization
There are significant gaps in cybersecurity knowledge, shared visibility and mutual trust between those who serve on organizations’ board of directors and IT security …
Six key facts about malicious macros and the cybercrime economy
“Cybercrime is big business and criminals are increasingly exploiting people to circumvent automated protection systems. Cybercriminals have, in the last nine months, …
Connected cars: Are tomorrow’s drivers at risk?
The Internet of Things (IoT) aims to enhance the way we engage with devices around the home and we are now beginning to see the growth of this technology reach our driveways. …
Open source security projects get $452,000 from the Linux Foundation
The Core Infrastructure Initiative (CII), a project managed by The Linux Foundation that enables technology companies, industry stakeholders and esteemed developers to …
Featured news
Resources
Don't miss
- Salesforce Gainsight compromise: Early findings and customer guidance
- Research shows identity document checks are missing key signals
- How one quick AI check can leak your company’s secrets
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks