![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110910/biohazard-400x200.jpg)
16% of mobile devices in developing markets now infected with malware
Mobile users already disadvantaged by an economic and digital divide have suffered the most from digital fraud throughout the COVID-19 pandemic. In emerging markets such as …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093901/ai1-400x200.jpg)
Trends in the evaluation and implementation of enterprise AI adoption
New O’Reilly research explores the techniques, tools, and practices enterprise organizations are using to better understand how artificial intelligence (AI) has evolved over …
![people](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/10120129/people-400x200.jpg)
A data-driven look at the key developments shaping the future of work
A recent CompTIA survey of HR professionals finds 67% report placing more emphasis on reskilling and upskilling efforts. For large organizations, the need is even more …
![QNAP](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/26122228/qnap-white-400x200.jpg)
QNAP NAS devices under ransomware attack
QNAP NAS device owners are once again under attack by ransomware operators, who are exploiting a recently fixed vulnerability to lock data on vulnerable devices by using the …
![medical devices](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/11091922/medical_devices_gradient-400x200.jpg)
Connected medical devices brought security loopholes mainstream
The increasing demand for self-health management, coupled with the digitalization of the modern healthcare ecosystem, translates into a medical connected devices market that …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095247/zero-400x200.jpg)
Push past zero trust barriers to securely connect the distributed workforce
If the past year has taught us anything, it’s that trusting a device simply because it originates from inside a corporate network is not a good idea. If an endpoint is …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/23122821/ai-brain-bkg-400x200.jpg)
AI industry alarmingly unprepared for real-world attacks
Adversa has published comprehensive research on the security and trustworthiness of AI systems worldwide during the last decade. The report reveals the most critical …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Cybercriminals evolving their tactics to exploit collective human interest
Phishing activity increased significantly in the first few months of 2020, taking advantage of pandemic-induced product shortages and increased usage of streaming services, …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
61% of organizations impacted by ransomware in 2020
Enterprises faced unprecedented cybersecurity risk in 2020 from increasing attack volume, the pandemic-driven digital transformation of work, and generally deficient cyber …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/19154819/biometrics_eye-400x200.jpg)
Consumers embracing biometrics to protect their information
Consumers across the U.S. and Canada have embraced digital banking and biometric identity proofing during the COVID-19 pandemic, a FICO study has found. The study found that …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094609/week_in_review3-400x200.jpg)
Week in review: Pulse Secure zero-day actively exploited, how to select an IAM solution
Here’s an overview of some of last week’s most interesting news, articles and interviews: Infosecurity transformation and building proactive mitigation strategies In this …
![find](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094457/find-400x200.jpg)
Security research project: The easiest way to get “experience” and land a job in cybersecurity
Despite what you might have heard, there’s no shortage of people looking for jobs in cybersecurity. Every open position triggers stacks of resumes, but the challenge is …
Featured news
Sponsored
Don't miss
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege
- Cloud security threats CISOs need to know about