Mirko Zorz
Reactions to the KeRanger ransomware for Macs
Palo Alto researchers have discovered the first fully functional ransomware aimed at Mac users. The malware, dubbed KeRanger, has been found bundled into the Mac version of …
Making sense of threat intelligence data in your IT environment
Threat intelligence data has been growing at an exponential rate of 39% a month. Enterprise customers are looking at around 30,000 events going into their SIEM every second. …
Working towards a common set of IoT standards
Major industry leaders who are invested in the future of the Internet of Things, announced they will unify as the Open Connectivity Foundation (OCF), an entity whose goal will …
Volvo to launch a car without a physical key
Can you imagine accessing and driving your car without a physical key? In a first for the automotive industry, Volvo is set to become the first car manufacturer to offer cars …
PacketFence: Free and open source network access control
PacketFence is a fully supported, free and open source network access control (NAC) solution. Its feature set includes a captive-portal for registration and remediation, …
W3C launches effort to replace passwords
The World Wide Web Consortium (W3C) is launching a new standards effort in web authentication that aims to offer a more secure and flexible alternative to password-based …
(IN)SECURE Magazine issue 49 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 49 has been released today. Table of contents …
Intercept, inspect and modify traffic flow with mitmproxy
mitmproxy is an interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed. All flows are kept in memory, which means that it’s …
Welcome to the new Help Net Security
We’re all about keeping you updated with important security stories, but this time around we have some news about us. During the weekend we rolled out a brand new version of …
5 ways to protect your company data from internal attacks
While Hollywood may love the image of the hacker lurking in the shadows, stealthily pillaging from across cyberspace, the reality is that threats from inside your network, …
Surprise? Most organizations are not cyber resilient
71 percent of UK organisations would rate their cyber resilience as low today, underlining a lack of preparedness to handle cyberattacks by the majority of UK organisations, …
Reactions to the EU-US Privacy Shield
The European Commission and the United States have agreed on a new framework for transatlantic data flows: the EU-US Privacy Shield. Here are some of the comments Help Net …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA