![LibreOffice](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111701/libreoffice-400x200.jpg)
Easily exploitable LibreOffice flaw is a godsend for hackers
A serious LibreOffice flaw can be easily exploited by attackers to deliver malware on computers running a vulnerable version of the popular free and open source office suite. …
![windows10 anniversary update](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111714/windows10-anniversary-400x200.jpg)
Windows 10 Anniversary Update brings security improvements
Microsoft has scheduled the release of Windows 10 Anniversary Update for August 2. Aside from new and/or improved tools to aid with productivity, gaming, device set-up, and a …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112155/skull-400x200.jpg)
Rooting Hummer malware brings $500,000 per day to its creator
Android malware with device rooting capabilities has been hitting Google Play for a while now, but for users third-party app stores the situation is even more dangerous. The …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112829/money-laptop-400x200.jpg)
How many businesses will pay a ransom if attacked?
Some 84 percent of information technology executives at firms that had not faced ransom attacks said they would never pay a ransom. But among firms that had been attacked, 43 …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113326/vault-400x200.jpg)
Companies are embracing an enterprise-wide encryption strategy
The biggest users of encryption are companies in financial services, healthcare and pharmaceutical, as well as technology and software industries, according to Thales. A new …
![Business ideas](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195343/compliance-400x200.jpg)
Top 10 strategic technologies for government in 2016
After nearly a decade of “doing more with less,” government CIOs remain under pressure to further optimize IT and business costs while leading digital innovation …
![facepalm](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113615/facepalm-400x200.png)
New Russian law to force service providers to decrypt encrypted comms
An extremely wide-ranging anti-terrorism law has been passed last week by the lower house of the Russian Federal Assembly (i.e. parliament), and it is widely expected to pass …
![World-Check](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111719/world-check-400x200.jpg)
World-Check crime and terror database exposed online
Security researcher Chris Vickery, who has become well-known for unearthing databases that should not be accessible via the Internet but are, has found another one that …
![Symantec](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112435/symantec-400x200.jpg)
Symantec, Norton AV products are riddled with serious flaws
Google security researcher Tavis Ormandy has unearthed a slew of critical vulnerabilities, including many remote code execution flaws, in Symantec and Norton enterprise and …
![hard drive](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112219/harddrive-400x200.jpg)
Most used drives sold on eBay hold personal information
Ecommerce sites are reselling used electronics without permanently erasing data from them. Based on an analysis of 200 second-hand hard disk drives and solid state drives …
![The Network Ops DDoS Playbook](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111723/The_Network_Ops_DDoS_Playboo-400x200.jpg)
The Network Ops DDoS Playbook
With the prevalence of DDoS attacks, good preparation and planning can go a long way toward making the DDoS response process as manageable, painless, and inexpensive as …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112812/danger-400x200.jpg)
Businesses are unprepared for emerging threats
Organizations are failing to appreciate the growing challenges of protecting their data and, as a result, are experiencing the economic impact of data loss, according to EMC. …