![Drone](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194549/done-phantom-400x200.jpg)
Eagles vs drones: A low-tech solution for a high-tech problem?
The Dutch National Police is aware that the use of drones – and the number of drones incidents – is only going to increase as time goes by. So, they are trying to …
![Business](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194552/business3-400x200.jpg)
Your board and cyber risk: Reimagining security protocols from the top down
As scrutiny of well-known financial services firms’ security practices continues to make news, the SEC has chosen to turn its attention to risks facing a certain subset of the …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194554/money-400x200.jpg)
Exposing the economics behind cyber attacks
A new survey by the Ponemon Institute provides insight into topics like the average earnings of a cyberattacker, the amount of time attacks typically take, and how to prevent …
![Binary](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195635/binary-sun-400x200.jpg)
UK activists dumps 2.5 GB of data stolen from US police union
Last Thursday, UK-based researcher and activist Thomas White has made available for download 2.5 GB of data stolen in a recent hack of the computer systems of the Fraternal …
![HP](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194736/hp-400x200.jpg)
Is your HP enterprise printer hosting malware for hackers?
“If you’re concerned about security, put your printers are behind a firewall and, if it’s a Hewlett-Packard, make sure port 9100 isn’t open,” says security …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194739/fire-400x200.jpg)
Reactions to the HSBC DDoS attack
Last week HSBC’s online banking website was taken down by a DDoS attack, leaving thousands of customers unable to access its services. Here are some of the comments Help Net …
![Tails](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194742/tails-318x200.png)
Tails 2.0 fixes many security issues
Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity. Tails 2.0 is …
![energy](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100508/energy-400x200.jpeg)
Defending the smart grid: What security measures to implement
Smart grids are a fundamental component of the European critical infrastructure. They are rooted on communication networks that have become essential elements allowing the …
Week in review: The death of Java plugin, Magento fixes e-store hijacking flaw, cybercriminals targeting healthcare data
Here’s an overview of some of last week’s most interesting news and articles: There’s no turning back: Say goodbye to the perimeter If you’ve been following …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195534/android-large-400x200.png)
60+ Trojanized Android games lurking on Google Play
Dr. Web researchers have discovered over 60 Trojanized game apps being offered on Google Play through more than 30 different game developer accounts. The games are made to …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195355/general_red-400x200.jpg)
Compromised enterprise networks fuel 236 percent increase in viruses and worms
Solutionary performed a broad analysis of the threat landscape, which uncovered several key findings. One of the most compelling finding links the rapid growth (236 percent) …
![matches](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194747/matches-400x200.jpg)
Consumers are increasingly concerned about privacy and they’re acting on it
More Americans are concerned about not knowing how the personal information collected about them online is used than losing their principal source of income. A new study by …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days