![Keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195218/keyboard-1-400x200.jpg)
Build serverless, secure apps in the cloud
Swirlds released the SDK for the hashgraph distributed consensus platform, which is free for download (the registration fields are optional). This software development …
![match](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111901/match-400x200.jpg)
Week in review: Spoofing boarding pass QR codes, blocking USB-based threats
Here’s an overview of some of last week’s most interesting news, reviews and articles: Malware hidden in digitally signed executables can bypass AV protection …
![FixBrowserRedirect](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111043/FixBrowserRedirect-400x200.jpg)
Beware of browser hijacker that comes bundled with legitimate software
Lavians, a “small software vendor team,” is packaging its offerings with a variant of browser-hijacking malware Bing.vc. The company sells and offers for free …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113053/fire3-400x200.jpg)
USBFILTER: Packet-level firewall for blocking USB-based threats
The problem of planted malicious USB devices is compounded by the fact that, no matter what, users will rarely stop to think and ultimately choose not to insert them because …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111038/cloud-400x200.jpg)
Should cloud vendors cooperate with the government?
More than one in three IT pros believe cloud providers should turn over encrypted data to the government when asked, according to Bitglass and the Cloud Security Alliance …
![Lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113522/lock-eye-400x200.png)
Ransomware/RAT combo searches for solvent businesses
The latest version of the Shade ransomware comes with a stealthy remote access Trojan, likely used to better gauge the amount of money the criminals can demand from the …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111040/open_source-400x200.jpg)
In limiting open source efforts, the government takes a costly gamble
The vast majority of companies are now realizing the value of open sourcing their software and almost all have done so for at least certain projects. These days Google, …
![Industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112121/cooling-tower-1368823_1920-400x200.jpg)
The economic impact of security incidents on critical information infrastructures
Cyber security incidents affecting CIIs (Critical Information Infrastructures) are considered nowadays global risks that can have significant negative impact for several …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112300/phishing-400x200.jpg)
Multi-layered phishing mitigation
In this podcast recorded at Black Hat USA 2016, Eyal Benishti, CEO at IRONSCALES, talks about their multi-layered phishing mitigation solution, which brings together human …
![world biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112821/world-biohazard-400x200.jpg)
Financial malware attacks increase as malware creators join forces
Kaspersky Lab blocked 1,132,031 financial malware attacks on users, a rise of 15.6 percent compared to the previous quarter, according to the results of the company’s IT …
![EFF](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111035/eff-400x200.jpg)
How the EFF was pushed to rethink its Secure Messaging Scorecard
As good as the idea behind Electronic Frontier Foundation’s Secure Messaging Scorecard is, its initial version left much to be desired. The idea was to provide a …
![Volkswagen](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195715/volkswagen-400x200.jpg)
Hundreds of millions of cars can be easily unlocked by attackers
Security researchers have come up with a way to unlock cars manufactured by vendors around the world, and are set to present their findings on Friday at the Usenix security …
Featured news
Sponsored
Don't miss
- CrowdStrike engages external experts, details causes of massive outage
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner