![facepalm](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113615/facepalm-400x200.png)
Corruption: The magnitude of risk
40 percent of all compliance officers surveyed believe their company’s bribery and corruption risks will increase in 2016, according to a new report by Kroll and the …
![Lockheed Martin](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113612/lockheed-cooling-400x200.jpg)
Microfluidic cooling turns down the heat on high-tech equipment
Thousands of electrical components make up today’s most sophisticated systems – and without innovative cooling techniques, those systems get hot. Lockheed Martin is …
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195728/laptop-eyes-technology-computer-400x200.jpg)
Has your network been compromised? Use RITA to find out
Have you heard about RITA? Real Intelligence Threat Analysis is a an open source tool – a framework, actually – aimed at helping organizations find malicious …
![Bug](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195248/bug-400x200.jpg)
Critical bug in libotr could open users of ChatSecure, Adium, Pidgin to compromise
A vulnerability in “libotr,” the C code implementation of the Off-the-Record (OTR) protocol that is used in many secure instant messengers such as ChatSecure, …
![cloud computing](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113632/cloud_computing-400x200.png)
Cloud computing: Security and evolution
What we’ve seen in the past 15 years is cloud computing becoming increasingly popular. Many companies have focused plenty of resources in making cloud computing the most …
![ear](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113618/ear-400x200.png)
Biometric tech uses sound to distinguish ear cavity shape
NEC is developing a new biometric personal identification technology that uses the resonation of sound determined by the shape of human ear cavities to distinguish …
![Magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194145/magnify-400x200.jpg)
Web application scanning with Htcap
Htcap is a free web application scanner that can crawl single page applications in a recursive manner by intercepting Ajax calls and DOM changes. The app is focused mainly on …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113635/criminal-400x200.png)
How cybercriminals evade detection
A new report by Damballa highlights not only how cybercriminals can stay under the radar for long periods of time, but also the need for enterprises to reassess existing …
![MariaDB](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113637/mariadb-400x200.png)
MariaDB Enterprise: Security at every level in the database
MariaDB announced MariaDB Enterprise Spring 2016. New capabilities defend data against application and network-level attacks, support faster development of high-performance …
![Telematics Gateway Unit](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113646/TGU-400x200.jpg)
Hacking Internet-connected trucks and buses
Among the things one can find with Shodan, the search engine for the Internet of Things, are trucks, buses and delivery vans that have been equipped with the Telematics …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113648/apple-400x200.jpg)
KeRanger Mac ransomware is a rewrite of Linux Encoder
KeRanger, the recently discovered first functional Mac ransomware, is a copy of Linux Encoder, the crypto-ransomware first unearthed and analyzed in November 2015 by Dr. Web …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194900/abstract2-400x200.jpg)
Innovation Sandbox and the modern threat landscape
In this podcast, recorded at RSA Conference 2016, Ajay Arora, CEO at Vera, and Amir Ben-Efraim, CEO at Menlo Security, discuss their participation in the Innovation Sandbox …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark