![entrepreneur](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194853/entrepreneur-400x200.jpg)
Europe’s cyber security accelerator program helps entrepreneurs
A new program to support cyber security startups will help develop innovative technical solutions. Start ups who want to offer cyber security solutions will be able to get …
![pound](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194857/pound-400x200.jpg)
How much could a cyber attack cost the HMRC?
HMRC could face compensation claims of over £13 billion if it were to lose people’s personal and financial data as a result of a cyber attack, according to a new study by …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194921/industry-400x200.jpg)
Threats to the critical information infrastructure on the rise
Citizens and businesses depend on information and communications infrastructure to support online critical services (e.g. energy, telecommunications, healthcare). Increased …
![airplane](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194937/airplane-400x200.jpg)
Cyber fraudsters steal over $50 million from airplane systems manufacturer
Austrian company FACC, which develops and produces components and systems made of composite materials for aircraft and aircraft engine manufacturers such as Boeing and Airbus, …
![escalator](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195000/escalator-400x200.jpg)
How well protected is NHS data?
A new study carried out by Vanson Bourne reveals a gap between the perceived strength of IT security measures in the NHS and the actual level of IT security built into NHS …
![sign](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195057/sign-1-400x200.jpg)
Good practice guide on disclosing vulnerabilities
ENISA published a good practice guide on vulnerability disclosure, aiming to provide a picture of the challenges the security researchers, the vendors and other involved …
![Police](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195250/police-400x200.jpg)
Group using DDoS attacks to extort business gets hit by European law enforcement
On 15 and 16 December, law enforcement agencies from Austria, Bosnia and Herzegovina, Germany and the United Kingdom joined forces with Europol in the framework of an …
![EU flag](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195648/EU-flag-400x200.jpg)
European data centre services provider Interxion suffers breach
A vulnerability present in the customer relationship management (CRM) system of Interxion, a Netherlands-based provider of carrier and cloud-neutral colocation data centre …
![EU flag](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195648/EU-flag-400x200.jpg)
Cyber crooks abuse legitimate EU Cookie Law notices in clever clickjacking campaign
Cyber crooks have set up a clever new clickjacking campaign that takes advantage of pop-up alerts that European users are (by now) accustomed to see: the “EU Cookie …
![Fear](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195411/phishing-400x200.jpg)
Scammers target citizens filing tax returns online
As ten million people prepare to complete their tax returns online in January, British citizens are being bombarded with scams. Forty per cent have received phishing emails …
![road](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195624/road-400x200.jpg)
Map a path through the issues of cloud, security, data analytics
2016 will be a difficult year to call for the European IT businesses – any of the usual linear progress in the IT industry in 2015 as a result of more powerful technologies …
![EU flag](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195648/EU-flag-400x200.jpg)
New EU rules on data protection put the citizen back in the driving seat
New EU data protection legislation, informally agreed on Tuesday and backed by Civil Liberties MEPs on Thursday morning, will create a uniform set of rules across the EU fit …
Featured news
Resources
Don't miss
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!
- Crypto-stealing iOS, Android malware found on App Store, Google Play