![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094518/email-400x200.jpg)
3.4 billion fake emails are sent around the world every day
At least 3.4 billion fake emails are sent around the world every day — with most industries remaining vulnerable to spear-phishing and “spoofing” cyberattacks simply because …
![servers](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113122/servers-400x200.jpg)
Vendor revenue in the worldwide server market increased to $19.8 billion in Q1 2019
Vendor revenue in the worldwide server market increased 4.4% year over year to $19.8 billion during the first quarter of 2019 (1Q19). Worldwide server shipments declined 5.1% …
![Microsoft NTLM](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094144/microsoft-ntlm-400x200.jpg)
Critical Microsoft NTLM vulnerabilities allow remote code execution on any Windows machine
The Preempt research team found two critical Microsoft vulnerabilities that consist of three logical flaws in NTLM, the company’s proprietary authentication protocol. These …
![US Customs](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094147/us-customs2-400x200.jpg)
US border agency contractor breached, license plate and travelers’ photos stolen
US Customs and Border Protection (CBP) announced that a hacker may have stolen sensitive data collected by the agency from a subcontractor’s network. “On May 31, …
![Search](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112405/search-threat-400x200.jpg)
Europe’s online economy risks losing €57 billion as SCA is enforced
Europe stands to lose €57 billion in economic activity in the first 12 months after SCA takes effect, according to a Stripe study conducted by 451 Research. The findings are …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102220/bulb-400x200.jpg)
Hackproofing smart meters and boosting smart grid security
Smart electricity meters are useful because they allow energy utilities to efficiently track energy use and allocate energy production. But because they’re connected to …
![check](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094507/check-400x200.jpg)
Analytics and automation solutions to help contact center IT staff ensure compliance
91% of of contact center IT staff believe increasing contact center compliance software investment should be considered a priority in the next year. 83% of contact center …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103741/eye2-400x200.jpeg)
Lack of visibility and IT staff availability: The main challenges of enterprise decentralization
As enterprise IT reckons with fundamental changes to their networking infrastructure, teams are being stretched to the limit, requiring a new approach to network monitoring …
![Think](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100555/think-400x200.jpg)
How human bias impacts cybersecurity decision making
The human brain is a fantastic machine, but we’re all subject to cognitive bias and reasoning errors – and cybersecurity pros are no exception. In a newly released …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094418/email-danger-400x200.jpg)
Malware peddlers hit Office users with old but reliable exploit
Emails delivering RTF files equipped with an exploit that requires no user interaction (except for opening the booby-trapped file) are hitting European users’ inboxes, …
![icosahedral](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103458/icosahedral-400x200.jpg)
Is there a weak link in blockchain security?
Recent research revealed that blockchain is set to become ubiquitous by 2025, entering mainstream business and underpinning supply chains worldwide. This technology is set to …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094153/keyboard1-400x200.jpg)
New user keystroke impersonation attack uses AI to evade detection
A sophisticated attack, called Malboard, in which a compromised USB keyboard automatically generates and sends malicious keystrokes that mimic the attacked user’s …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes