![Swann](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100516/swann-400x200.jpg)
Swann security cameras vulnerable to spying hack
Researchers have unearthed a security flaw in a Swann security camera that allows attackers to spy on the video and audio feed of anyone’s camera. Swann SWWHD-Intcam is …
![Google security](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100518/google_security-400x200.jpg)
After extensive testing, Google introduces the Titan Security Key
Google recently shared that since it made employees use physical security keys instead of passwords and one-time codes, none of them – and there are over 85,000 – …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101057/healthcare-400x200.jpg)
Securing healthcare organizations: The challenges CISOs face
Healthcare organizations are ideal targets for criminals looking to steal personal and other sensitive information, as the industry is lagging behind when it comes to …
![SAP](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101227/sap-400x200.jpg)
ERP applications under attack: How criminals target the crown jewels
Business-critical applications running the biggest organizations in the world are under attack, according to research from Digital Shadows and Onapsis. The report shows a rise …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102617/phishing-400x200.jpg)
Attackers playing into users’ commitment to security continue to sail through defenses
KnowBe4 shared its Top 10 Global Phishing Email Subject Lines for Q2 2018. The messages in the report are based on simulated phishing tests users received or real-world emails …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102312/bulb-400x200.jpeg)
Not many organizations scale their digital initiatives beyond the piloting stage
As organizations continue to embrace digital transformation, they are finding that digital business is not as simple as buying the latest technology — it requires significant …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103700/money-1-400x200.jpg)
ZDI offers hefty bounties for zero-days in popular web servers, CMSes
The Trend Micro-backed Zero Day Initiative is asking bug hunters to look for zero-day RCE vulnerabilities in several open source server-side products and is ready to pay up to …
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195722/glass-262105_1920-400x200.jpg)
72% of CEOs admit they’ve taken intellectual property from a former employer
In a clear demonstration that top executives defy data security best practices and company policy, 72 percent of CEOs admit they’ve taken valuable intellectual property (IP) …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194933/password-1-400x200.jpg)
Major websites still fail to steer users towards better passwords
The death of passwords is predicted with regular frequency, but we’re still to see it actually happen. It’s possible that it will happen one day but, in the …
![fence](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101822/fence-400x200.jpg)
Adopting a Zero Trust approach is the best strategy to control access
A new study conducted by Forrester Consulting found that organizations powering Zero Trust Security with next-gen access solutions reported twice the confidence to accelerate …
![city](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110514/city-1-400x200.jpg)
Smart cities spending to reach $158 billion in 2022
Smart City initiatives will attract technology investments of more than $81 billion globally in 2018, and spending is set to grow to $158 billion in 2022, according to IDC. …
![Bluetooth](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103157/bluetooth1-400x200.jpg)
Bluetooth vulnerability allows snooping of traffic between paired devices
Researchers Eli Biham and Lior Neumann have discovered a vulnerability in two Bluetooth features that could be exploited by attackers to gain a man-in-the-middle position and …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage