![road](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102349/road-400x200.jpg)
41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025
The number of devices connected to the Internet, including the machines, sensors, and cameras that make up the Internet of Things (IoT), continues to grow at a steady pace. A …
![docker](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112739/docker-400x200.jpg)
Webinar: Inside a Docker cryptojacking exploit
In this webinar, Ethan Hansen, Security Analyst for Threat Stack’s Cloud Security Operations Program, will discuss recently observed Docker exploit attempts from the field, …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094049/cisco1-400x200.jpg)
Cisco fixes critical vulnerabilities in its SD-WAN, DNA Center solutions
Cisco has released another batch of fixes for many of its products, including its SD-WAN and DNA Center solutions, its Email Security Appliance, Security Manager, SOHO …
![(IN)SECURE 62](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094057/insecure-mag-62-400x200.jpg)
(IN)SECURE Magazine issue 62 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 62 has been released today. Table of contents …
![cube](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103500/cube-400x200.jpg)
IoT explodes worldwide, researchers investigate security issues present in the devices real users own
About 40 percent of households across the globe now contain at least one IoT device, according to Avast. In North America, that number is almost double, at 66 percent, …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094108/qualys-visibility2-400x200.jpg)
How to add security to digital transformation processes
In this Help Net Security podcast, Marco Rottigni, Chief Technical Security Officer for Qualys across EMEA, talks about adding security to digital transformation processes. …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095925/botnet-400x200.jpg)
Botnets shift from Windows towards Linux and IoT platforms
Botnets in 2018 continued to use DDoS as their primary weapon to attack high-speed networks, according to NSFOCUS. Continuous monitoring and research of botnets discovered …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105434/idea-400x200.jpg)
How can organizations leverage AI technologies to achieve project success?
AI disruption is happening and at a large scale: 81 percent of project professionals report their organization is being impacted by AI technologies; 37 percent say adopting AI …
![eSentire report](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094114/esentire-report-400x200.jpg)
Download: eSentire Q1 2019 Quarterly Threat Report
The eSentire Q1 2019 Quarterly Threat Report provides a snapshot of threat events and trends investigated by the eSentire Security Operations Center (SOC) in January, February …
![alert](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105208/alert-400x200.jpg)
Google launches Chrome extension for reporting suspicious sites
Google has announced two new features aimed at protecting users from deceptive and malicious websites: A new type of warning that will direct users away from sites that have …
![Tesla](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094059/tesla-400x200.jpg)
Research shows Tesla Model 3 and Model S are vulnerable to GPS spoofing attacks
Tesla Model S and Model 3 electric cars are vulnerable to cyberattacks aimed at their navigation systems, according to research from Regulus Cyber. Staged attack caused the …
![Firefox](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094102/firefox-400x200.jpg)
Mozilla plugs critical Firefox zero-day used in targeted attacks
A critical Firefox zero-day remote code execution vulnerability is being abused in targeted attacks in the wild, Mozilla has warned on Tuesday. About the vulnerability …
Featured news
Resources
Don't miss
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!