Help Net Security
The importance of backup
Over 75 percent of consumers store their data digitally and more than 50 percent state that their personal data are more valuable than their actual devices – solidifying …
Most enterprise network teams now deal with security investigations
85 percent of enterprise network teams today are now involved with security investigations, indicating a major shift in the role of those teams within enterprises, according …
Data breaches drive identity theft and fraud
Data breaches are affecting consumers nationwide and residents in and around Washington, D.C. are not immune to the consequences. According to a survey by Experian, 57 percent …
Week in review: Hacking air-gapped computers using heat, car hacking, malware threat to virtual currencies
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: New PoS malware family comes with keylogger component Dubbed …
10 practical security tips for DevOps
More organizations are embracing DevOps and automation to realize compelling business benefits, such as more frequent feature releases, increased application stability, and …
Critical flaw in WiFi routers puts hotels and millions of guests at risk
A critical vulnerability in ANTlabs InnGate devices, a popular Internet gateway for visitor-based networks and commonly installed in hotels and convention centers, has been …
Researchers identify malware threat to virtual currencies
INTERPOL and Kaspersky Lab have identified a threat to the blockchain in virtual transactions that could result in them being embedded with malware or other illegal data. …
The multiple benefits of IT auditing
Regulatory compliance requirements provide instructions for organizations on how to protect the data of their employees, business operations, and customers that are stored on …
Amazon Cloud Drive now with unlimited cloud storage
Amazon announced unlimited cloud storage with Amazon Cloud Drive—two new storage plans for customers to securely store their existing content collections and automatically …
How companies secure their cloud data
As companies accelerate their adoption of the cloud, the cloud data footprint is expected to grow to 6.5 zettabytes by 2018. This rapid migration of data into the cloud …
Behavioral biometrics: The password you can’t forget
This year’s Mobile World Congress featured more biometrics technology than ever before, with the launch of Google’s Android Pay and Samsung Pay both unveiling …
Data lurking: How to protect your company against overlooked insider threats
Enterprises often fear hackers as their number one security threat. However, they should be more scared of what happens internally. More often than not, data breaches come …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)