![CTB-Locker for websites](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114004/CTB-Locker-websites-400x200.jpg)
CTB Locker ransomware now also encrypts websites
The well-known crypto ransomware CTB Locker is back. After a considerable slowdown in distribution, it is being pushed onto users again, and this time its executable has been …
![fish phishing](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114006/fish-400x200.jpg)
Phishing underground: Exploiting the human vulnerability
At the RSA Conference in San Francisco, PhishLabs exposed the murky evolution of a thriving, sophisticated phishing underworld. Their report is based on more than one million …
![Businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114011/businessman-400x200.jpg)
Are CIOs wasting millions on infosec that doesn’t work?
There’s overwhelming consensus among IT executives that the foundation of cybersecurity—cryptographic keys and digital certificates—is being left unprotected, leaving …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114016/money-coins-400x200.jpg)
A mobile data breach could cost you $26.4 million
While data breaches make great headlines, what is often missing from those reports are the details on how the attackers got into the organization in the first place. Mobile …
![Fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195511/fire-match-400x200.jpg)
The rise of polymorphic malware
97% of malware is unique to a specific endpoint, rendering signature-based security virtually useless. The data collected by Webroot throughout 2015 shows that today’s threats …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195244/eye-400x200.jpg)
Week in review: Linux Mint hack, crypto ransomware hits hospitals, and educating policymakers on cybersecurity
Here’s an overview of some of last week’s most interesting news and articles: Can poorly designed embedded devices kill? The industry is not taking safety and …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114023/linux-400x200.jpg)
Protecting enterprise data centers from threats that target Linux servers
Today’s internet is largely powered by Linux servers, many of which have become the target of attackers looking to utilize this vast pool of resources for much larger and more …
![lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114027/lights-400x200.jpg)
ServiceNow reinvents security response
ServiceNow is extending its automation and orchestration expertise to transform the way organizations respond to threats. Security Operations gives both security and IT teams …
![San Francisco](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114030/san_francisco_california-400x200.jpg)
CyberCalifornia initiative to facilitate research and innovation
More than ever, California stands at the forefront of new technologies based on the Internet of Things (IoT). We are also increasingly vulnerable, a fact underscored by …
![Lock keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114034/keyboard-1-400x200.jpg)
Crypto ransomware hits German hospitals
At least three hospitals in the German state of North Rhine-Westphalia have been hit with crypto ransomware. One is Lukas Krankenhaus (Lukas Hospital) in Neuss, the second one …
![iPhone](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114037/mobile_devices4-400x200.jpg)
Apple says DoJ’s request for iPhone unlocking is unconstitutional
Apple has filed a motion to vacate the earlier court order that would force them to help the FBI access the contents of the iPhone of the San Bernardino gunman by creating a …
![mobile](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114042/mobile-400x200.jpg)
Is zero-effort computer security a dream?
Researchers from the University of Alabama at Birmingham and Aalto University have found vulnerabilities in a recently proposed user-verification security system for …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark