cybersecurity
![mobile device](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111757/mobile-400x200.jpg)
High-level vulnerabilities discovered in 84% of Android shopping apps
More than 84% of the shopping apps have three or more high-level security vulnerabilities, according to a security assessment by Appknox and Seworks. A total of 274 …
![Las Vegas](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111405/las-vegas-400x200.jpg)
America’s most cyber insecure cities exposed
Coronet researchers identified Las Vegas, Memphis and Charlotte as America’s most cyber insecure cities. “While big companies may have the budgets, personnel and …
![fish phishing](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114006/fish-400x200.jpg)
Certain types of content make for irresistible phishes
A mature anti-phishing program keeps organizations safer, claims Cofense, and offers as proof the decreasing susceptibility of their customers’ employees to mock …
![red](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101022/red-400x200.jpg)
Fighting ransomware with network segmentation as a path to resiliency
Recent cybersecurity events involving the use of ransomware (WannaCry and similar variants) represent the latest examples highlighting the need for organizations to not only …
![editor](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101601/editor2-400x200.jpg)
The percentage of open source code in proprietary apps is rising
The number of open source components in the codebase of proprietary applications keeps rising and with it the risk of those apps being compromised by attackers leveraging …
![analyst](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103822/analyst-400x200.jpg)
The ethical and legal dilemmas of threat researchers
Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102540/GDPR-400x200.jpg)
Are you ready for the GDPR deadline?
The General Data Protection Regulation (GDPR) compliance deadline looms four days away, but only 29 percent of companies will be ready, according to a new global survey by …
![evil](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102415/evil-400x200.jpg)
Internet of Things: Who is watching you?
An overwhelming number of IT security professionals (85%) see a cyberattack on critical infrastructure happening in the next five years. Pwnie Express CEO Todd DeSisto says …
![Europe](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110925/europe-400x200.jpg)
Europe continues to be a cybercrime hub
ThreatMetrix announced new data revealing a 30 percent year-on-year increase in the volume of cyberattacks hitting Europe in the first quarter of 2018. As attacks patterns …
![Office 365](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103303/office365-400x200.jpg)
How can Office 365 phishing threats be addressed?
With the rapid expansion of Office 365, more and more threats can emerge within its infrastructure, particularly via email. This is due in part to the size and ease of …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102610/gdpr-3-400x200.jpg)
Most firms struggle to comply with GDPR deadline
With GDPR coming into effect in just over a week from today, 85 percent of firms in Europe and the United States will not be ready on time. Additionally, one in four will not …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101051/tunnel-400x200.jpg)
Most businesses believe stronger data protection policies will lead to fewer breaches
In light of new data privacy legislations, a new Webroot report looks at how businesses in the U.S., U.K., and Australia are adjusting to new data security measures in order …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?