![Phone](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112408/phone-red-400x200.jpg)
When a scammer calls: 3 strategies to protect customers from call spoofing
One of the first internet memes was born when The New Yorker published the now iconic cartoon captioned, “On the internet, no one knows you’re a dog.” Today we might update …
![Shreekant Thakkar](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/07143015/shreekant_thakkar_2-tii-400x200.jpg)
The role of automation in staying on top of the evolving threat landscape
In this interview with Help Net Security, Dr Shreekant Thakkar, Chief Researcher, Secure Systems Research Centre at TII, talks about the ever evolving threat landscape and how …
![syringe](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094039/syringe2-400x200.jpg)
Top tips for preventing SQL injection attacks
In the wake of the Colonial Pipeline attack and other high-profile cases, IT teams may be scrabbling to shore up their endpoint protection. But those in the developer …
![David Taylor](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/02155131/david_taylor_2-protiviti-400x200.jpg)
Ransomware attacks: The power of adaptation
The pandemic has had a major impact on almost every aspect of our society and left many organizations susceptible to increasingly sophisticated ransomware attacks. In this …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093341/crypto-coin-400x200.jpg)
Crypto exchanges and their customers must protect themselves as attacks continue
Within the past several years, cryptocurrency has gone from a niche hobby to a mainstream concern. Cryptocurrencies like Bitcoin, Ethereum, and even Dogecoin have generated …
![WordPress](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/04181140/red-wordpress-logo-400x200.jpg)
Securing your WordPress website against ransomware attacks
It’s no surprise to anyone who works in security that there’s been an explosion in ransomware incidents over the last two years, costing companies across various industries …
![Maytal Brooks-Kempler](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/01115132/maytal_brooks_kempler_1-helena-400x200.jpg)
How getting a CISSP can change the course of a career
Technical certifications are increasingly in demand with 87% of IT employees possessing at least one and 40% pursuing their next, according to Questionmark. Despite …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/23122821/ai-brain-bkg-400x200.jpg)
The age of AI-powered devices at the edge
The vast amount of data constantly collected by the billions of sensors and devices that make up the IoT can pose a serious processing challenge for businesses that rely on …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093814/user-400x200.jpg)
3 ways to protect yourself from cyberattacks in the midst of an IT security skill shortage
With COVID-19 variants on the rise, widespread remote work may be sticking around longer than IT leaders would like, which comes with a heightened risk for cyberattacks that …
![Baha Zeidan](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/01113801/baha_zeidan_2-azalea_health-1-400x200.jpg)
Healthcare cybersecurity under attack: How the pandemic affected rural hospitals
Ever since it started, the pandemic has greatly affected the overall threat landscape, with different organizations falling victims to cyberattacks. Understandably, those who …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/29153125/encryption-1-400x200.jpg)
Out with the old, in with the new: From VPNs to ZTNA
The VPN held an important role in the evolution of the internet, and for decades has supported businesses in securing their networks. VPNs have been used by businesses and …
![Joe Slowik](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/30155348/joe_slowik_2-gigamon-400x200.jpg)
Critical infrastructure today: Complex challenges and rising threats
Cyber attacks against critical national infrastructure are escalating. The ransomware hit on Colonial Pipeline was a clanging wake-up call for the public, but cybersecurity …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?