Help Net Security
What’s critical to the success of the Internet of Things?
Managing identities and access is critical to the success of the Internet of Things (IoT), but in its current form identity and access management (IAM) cannot provide the …
Hackers and makers to meet in Amsterdam at HITB Haxpo
This year’s Hack In The Box Security Conference in Amsterdam will once again feature the HITB Haxpo. This technology expo for hackers, makers, builders and breakers, …
Equation Group: Cyber espionage, compromising HDD firmware, sophisticated malware
For several years, the Kaspersky Lab Global Research and Analysis Team (GReAT) has been monitoring more than 60 advanced threat actors responsible for cyber-attacks worldwide. …
Banking Trojan Dyreza sends 30,000 malicious emails in one day
A massive spam wave is installing banking Trojan Dyreza on tens of thousands of computers to steal sensitive financial data from unsuspecting customers, warns Bitdefender. …
BYOD: Better stay used to it
BYOD is a common trend in organizations today. Businesses may be thrilled they don’t have to pay for tablets or smartphones for their workforce and don’t usually …
1 billion data records compromised in data breaches
More than 1,500 data breaches led to one billion data records compromised worldwide during 2014, according to Gemalto’s Breach Level Index (BLI). These numbers represent …
Week in review: Car hacking and hijacking, critical Windows flaws, and Forbes.com compromise
Here’s an overview of some of last week’s most interesting news, interviews and articles: Which kind of security professional are you? Since I became a part of the …
16 million mobile devices infected by malware
Security threats to mobile and residential devices and attacks on communications networks rose in 2014, threatening personal and corporate privacy and information. …
The limits of prevention-centric security programs
In an analysis of tens of thousands of malicious files, Damballa discovered that it can take more than six months for traditional AV tools to create signatures for 100% of the …
Phishing attacks increasingly target financial data
28.8 percent of phishing attacks last year aimed to steal financial data from consumers, according to a new report by Kaspersky Lab. The results show how cybercriminals have …
IT security training is a top priority for CIOs
CIOs are taking a multipronged approach to protecting sensitive company information, and the majority are currently taking or planning to take steps in the next 12 months to …
Increase in enterprise cloud adoption and data risk
Skyhigh Networks analyzed actual cloud usage data from over 15 million enterprise employees across 350 enterprises. Although they found a record high percentage of cloud …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)