![gear](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110730/gear-400x200.jpg)
Security orchestration and automation: Closing the gap in incident response
Companies in North America are poised to increase their reliance on security orchestration and automation for incident response (IR), according to Enterprise Strategy Group …
![mobile payment](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110344/mobile_payment-400x200.jpg)
Security concerns still undermining mobile payments
Concerns about fraud and theft risks are inhibiting adoption of mobile wallets, but businesses underestimate the problem. The survey found more than half of consumers believe …
![OverSight](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110346/oversight-mac-400x200.jpg)
OverSight detects when Mac malware uses built-in camera, mic
Users who want to be warned each time their Mac’s camera and microphone are switched on – either by a legitimate process or, more importantly, by malware – …
![sign](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195057/sign-1-400x200.jpg)
Security fatigue is real – we need usable security
A preliminary study involving 40 computer users of different ages, occupations, and living in different settings has shown what most of use already know to be true: security …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111038/cloud-400x200.jpg)
A closer look at data breach preparedness
While most organizations have a data breach preparedness plan in place, executives are not updating or practicing the plan regularly and lack confidence in its effectiveness, …
![fish phishing](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114006/fish-400x200.jpg)
Vast phishing campaigns boost global criminal attack footprint
The Anti-Phishing Working Group (APWG) observed a record number of phishing attacks in the second quarter of 2016. APWG observed 466,065 unique phishing websites in Q2. This …
![Yahoo](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110354/yahoo-400x200.jpg)
Yahoo security breach highlights the importance of personal protection
The recent breach at Yahoo has proved once again that, regardless of a company’s size and expertise, security is always an issue. In the wake of the incident which left …
![IP EXPO 2016](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110349/IPEXPO-2016-400x200.jpg)
Photos: IP EXPO Europe 2016
With six IT events under one roof, 300+ exhibitors and 300+ free to attend seminar sessions, IP EXPO Europe is taking place this week in London, UK. IP EXPO Europe now …
![Hook Up Dating app](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110351/hook_up_dating-400x200.jpg)
Database containing info of 1.5 million online daters found leaking
Sensitive personal information of some 1.5 million users of several dating/cheating websites and apps has been found to be accessible via the Internet. This information …
![Yahoo](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110440/yahoo-400x200.jpg)
How to close your Yahoo account
In light of the recent massive Yahoo breach an the fact that Yahoo scanned incoming emails on behalf of US intelligence, many are opting to close their accounts to protect …
![Yahoo! HQ](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110356/yahoo_hq-400x200.jpg)
Yahoo scanned incoming emails on behalf of US intelligence
In 2015, Yahoo created custom software for covertly scanning their customers’ incoming emails, and deployed it on behalf of a US intelligence agency, Reuters reported on …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110410/ddos-400x200.jpg)
53% of DDoS attacks result in additional compromise
DDoS attack volume has remained consistently high and these attacks cause real damage to organizations, according to Neustar. The global response also affirms the prevalent …
Featured news
Sponsored
Don't miss
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner
- Breaking down FCC’s proposal to strengthen BGP security