![Avast](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095513/avast-400x200.jpg)
The attack surface is growing faster than it has at any other point in the history of technology
Avast launched its annual Threat Landscape Report, detailing the biggest security trends facing consumers in 2019 as collected by the Avast Threat Labs team. Some of the key …
![stock price](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104355/stock_price-400x200.jpeg)
Security analytics to reach $12 billion by 2024
Amid a maelstrom of cybersecurity threats and rampant hacking attempts that leverage the power of the IoT against itself, organizations are forced to realize that they are on …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194518/brain-400x200.jpg)
The benefits and limitations of AI in cybersecurity
Today’s AI cannot replace humans in cybersecurity but shows promise for driving efficiency and addressing talent shortage, a new report by ProtectWise has shown. Penetration …
![hole](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09104943/hole-400x200.jpeg)
Why are some vulnerabilities disclosed responsibly while others are not?
EU’s cybersecurity agency ENISA has delved into the problematics of vulnerability disclosure and has released a report that addresses economic factors, incentives and …
![Attivo Networks](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095515/attivo_networks-400x200.jpg)
An overview of the Attivo Networks solution
This article is third in a five-part series developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112826/biohazard-400x200.jpg)
McAfee researchers analyze cybercriminal markets, reveal tactics, targets
McAfee released its McAfee Labs Threats Report: December 2018, examining activity in the cybercriminal underground and the evolution of cyber threats in Q3 2018. McAfee Labs …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105123/person-400x200.jpg)
Does your personality put you at risk for cybercrime?
Impulse online shopping, downloading music and compulsive email use are all signs of a certain personality trait that make you a target for malware attacks. New research from …
![Coins](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101442/coins-400x200.jpg)
Cryptocurrency craze drives coinmining malware surge
The cryptocurrency craze of 2018 helped drive a 1,500 percent increase in coinmining malware when compared to 2017, according to eSentire. Coinmining malware mines …
![city](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100239/city-400x200.jpg)
Delivering security and continuity for the cities of tomorrow
It’s seems like almost every part of our lives is now being supported by emerging technologies, from predictive analytics and artificial intelligence to the Internet of Things …
![element](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103225/element-400x200.jpg)
Warding off security vulnerabilities with centralized data
This is the second article of a series, the first article is available here. File access permissions Having a system that lets you set the proper permissions and prevents …
![thief](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095826/thief-400x200.jpg)
Insight into the growing problem of highly sophisticated fraud
Sophisticated fraud campaigns are beginning to outwit machine learning solutions especially the ones that only detect known fraud patterns based on historic loss experience, …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Hackers have become increasingly deft at stealing student data
Data collection is a vital resource for educational institutions across the world, including student records, which contain highly sensitive material such as a student’s …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage