![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
Public cloud services market to grow to $208.6 billion in 2016
The worldwide public cloud services market is projected to grow 17.2 percent in 2016 to total $208.6 billion, up from $178 billion in 2015, according to Gartner, Inc. The …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110607/networked-world-400x200.jpg)
Week in review: MySQL 0-day, Stingrays, and the end of Patch Tuesday
Here’s an overview of some of last week’s most interesting news and articles: Five ways to respond to the ransomware threat While organizations wrestle with the …
![power meter](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110611/power_meter-400x200.jpg)
ICS-CERT warns of remotely exploitable power meter flaws
Two remotely exploitable vulnerabilities, one of which can lead to remote code execution, have been found in Schneider Electric’s ION Power Meter products and FENIKS PRO Elnet …
![IoT Village](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110616/iot-village-400x200.jpg)
IoT Village uncovers 47 security vulnerabilities across 23 devices
New dangers in both home security and municipal power facilities were revealed as the results of the 2nd Annual IoT Village, held at DEF CON 24 in Las Vegas. More than 47 new …
![magnifying glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195300/magnifying-glass-400x200.png)
Top trends in security testing and vulnerability management
Many businesses fail to conduct frequent security testing despite believing that it’s critically important to securing their systems and data. One in five of businesses …
![Pokemon Go](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111556/pokemon_go-400x200.jpg)
Bogus Pokémon GO guide app roots Android devices
The popularity of Pokémon GO is apparently on the wane, but there are still more than enough players to make it a good lure for cyber crooks. In fact, fake apps like the …
![decision](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110630/decision-400x200.jpg)
What information people most fear being hacked
People are most fearful of their credit cards or bank statements being hacked, with 78 percent of Americans and Germans ranking it a top concern. That number is even higher in …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112756/money-skull-400x200.jpg)
Students unaware about ransomware costs, impact
A new Webroot survey reveals a disconnect between what college students say they would pay to access personal data being held for ransom and the reality of actual ransomware …
![employee](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110613/employee-400x200.jpg)
Real damage done by malicious, careless and compromised insiders
A recent OnePoll survey has revealed some surprising results regarding malicious insiders. 36 percent of surveyed companies experienced security incidents involving malicious …
![Eyes](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112400/laptop-eyes-technology-computer-400x200.jpg)
What proposed Rule 41 changes mean for your privacy
Last week, US Senator Ron Wyden took the floor of the Senate to explain why his (and his colleagues’) Stopping Mass Hacking Act should be voted in. The bill, consisting …
![Adobe AIR](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110618/adobe_air-400x200.jpg)
Android apps based on Adobe AIR SDK send out unencrypted data
Developers using the Adobe AIR SDK should update to the latest version of the software development kit and rebuild the apps as soon as possible if they don’t want their …
![Google Nexus](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110621/google-nexus56-400x200.jpg)
Hack a Nexus from afar, get $200,000
Google has issued a challenge to bug hunters around the world: find a vulnerability or bug chain that achieves remote code execution on multiple Android devices knowing only …
Featured news
Sponsored
Don't miss
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner
- Breaking down FCC’s proposal to strengthen BGP security