![Business](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195540/business-163464_1280-400x200.jpg)
UK: Financial fraud soars
More than 1 million incidents of financial fraud – payment card, remote banking and cheque fraud – occurred in the first six months of 2016, according to official …
![Lock keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114034/keyboard-1-400x200.jpg)
HDDCryptor ransomware uses open source tools to thoroughly own systems
HDDCryptor (aka Mamba) is a particularly destructive piece of ransomware that encrypts files in mounted drives and network shares, locks the computers’ hard disk, and …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195157/user-400x200.jpg)
Identity and personal data theft account for 64% of all data breaches
Data breaches increased 15% in the first six months of 2016 compared to the last six months of 2015, according to Gemalto. Worldwide, there were 974 reported data breaches and …
![energy](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113228/energy-400x200.jpg)
Energy sector IT pros overconfident in data breach detection skills
A new study by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to quickly …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111248/danger-2-400x200.jpg)
Ransomware families and volume of attacks continue to rise
Both the number of variants of ransomware and volume of malware attacks were on the rise in August, according to Check Point. During August, the number of active ransomware …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112759/risk-400x200.jpg)
IT asset managers must be proactive with up-front risk mitigation strategies
Recent Iron Mountain research reveals the risks associated with licensing critical software applications, and why procurement professionals and IT asset managers must take …
![Xiaomi](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110559/xiaomi-400x200.jpg)
Xiaomi smartphones come equipped with backdoor
When you buy a new mobile device with certain apps already pre-installed on, you’re effectively forced to trust that the device maker or reseller (depending on who …
![iCloud spam](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110604/icloud_spam-400x200.jpg)
Mobile users actively spammed from compromised iCloud accounts
Spammers have been compromising North American Apple users’ iCloud accounts, and using them to send spammy text messages to mobile users in China. The messages advertise …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195446/cisco-400x200.jpg)
BENIGNCERTAIN-like flaw affects various Cisco networking devices
The leaking of BENIGNCERTAIN, an NSA exploit targeting a vulnerability in legacy Cisco PIX firewalls that allows attackers to eavesdrop on VPN traffic, has spurred Cisco to …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194237/code-400x200.jpg)
Connected devices riddled with badly-coded APIs, poor encryption
The advent of home automation and rapid rise of smart home connected devices is seeing some vendors and new startups scramble to become a part of the movement, with ABI …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112023/face-400x200.jpg)
The hidden cost of the insider threat
Organizations are spending an average of $4.3 million annually to mitigate, address, and resolve insider-related incidents – with that spend surpassing $17 million annually in …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111933/ddos-1-400x200.jpg)
UDP flood attacks becoming increasingly powerful
When it comes to quantitative indicators, the last quarter can be marked by significant quantitative decline, according to DDoS-GUARD. The number of detected DDoS attacks is …
Featured news
Sponsored
Don't miss
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner
- Breaking down FCC’s proposal to strengthen BGP security