Help Net Security
A closer look at LepideAuditor Suite
Server systems are the pillars of an organization’s working environment, and they should be up and running at all times, without any interruptions. If a server crashes …
Dangerous vulnerabilities plague IoT home security systems
Owners of Internet-connected home security systems may not be the only ones monitoring their homes. A new HP study found that 100 percent of the studied devices used in home …
Majority of dating apps are open to hacks
IBM Security found that over 60% of leading Android dating mobile apps they studied are potentially vulnerable to a variety of cyber-attacks that put personal user information …
Are organizations ready for the embedded computing takeover?
It is bordering on cliché to acknowledge that the Internet is a double-edged sword. As time goes by, the statement takes on even greater significance, in light of its …
How public Wi-Fi puts unprotected users at risk
76% of American smartphone and tablet users are at risk of privacy loss and identity theft via public Wi-Fi networks. The risk of using public Wi-Fi without a protected …
Kill Chain 3.0: Update the cyber kill chain for better defense
If you’re in infosec, you’ve surely heard of the kill chain – a defense model designed to help mitigate more advanced network attacks. The kill chain …
Unsurprisingly, adults don’t read terms and conditions of mobile apps
Today, we spend more time on our smartphones and tablets than ever before, downloading games on the go, banking online or conducting the weekly grocery shop. However, despite …
Security now one of the top risks for business leaders worldwide
Cybersecurity has come to the forefront of risk oversight for board members and C-suite executives, according to results of a survey of business executives by Protiviti and …
Are smart homes security smart?
A new ENISA study aims to identify both the security risks and challenges as well as the countermeasures required for emerging technologies in smart homes, providing a …
Which kind of security professional are you?
Much has been said and written about the arrogance prevalent in the computer industry, especially that of gamers and security professionals. A well-known female gamer recently …
Week in review: Anthem breach, critical IE 11 bug can be used for phishing attacks
Here’s an overview of some of last week’s most interesting news and articles: Overcoming the daily challenges of a security team The institutionalization of …
How can organizations guard against hackers in 2015?
Advanced persistent threats, malware sent via attachments, direct targeting of specific users through spear phishing techniques, vulnerabilities exploited to silently deliver …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)