![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105123/person-400x200.jpg)
Does your personality put you at risk for cybercrime?
Impulse online shopping, downloading music and compulsive email use are all signs of a certain personality trait that make you a target for malware attacks. New research from …
![Coins](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101442/coins-400x200.jpg)
Cryptocurrency craze drives coinmining malware surge
The cryptocurrency craze of 2018 helped drive a 1,500 percent increase in coinmining malware when compared to 2017, according to eSentire. Coinmining malware mines …
![city](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100239/city-400x200.jpg)
Delivering security and continuity for the cities of tomorrow
It’s seems like almost every part of our lives is now being supported by emerging technologies, from predictive analytics and artificial intelligence to the Internet of Things …
![element](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103225/element-400x200.jpg)
Warding off security vulnerabilities with centralized data
This is the second article of a series, the first article is available here. File access permissions Having a system that lets you set the proper permissions and prevents …
![thief](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095826/thief-400x200.jpg)
Insight into the growing problem of highly sophisticated fraud
Sophisticated fraud campaigns are beginning to outwit machine learning solutions especially the ones that only detect known fraud patterns based on historic loss experience, …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Hackers have become increasingly deft at stealing student data
Data collection is a vital resource for educational institutions across the world, including student records, which contain highly sensitive material such as a student’s …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112441/users-400x200.jpg)
Digital skills are critical for tackling the rising tide of cybercrime
The rising tide of cybercrime shows no sign of slowing. Whether it’s hacking, identity fraud or malware attacks, online criminals have proven themselves to be both relentless …
![Equifax](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103216/equifax-400x200.jpg)
Equifax: A study in accountability but not authority responsibility
Like most of the security community, I have spent hours digesting the recently released U.S. House of Representatives Committee on Oversight and Government Reform report on …
![chip](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095522/chip-400x200.jpg)
Vulnerabilities in high-performance computer chips could lead to failures in modern electronics
A Washington State University research team has uncovered significant and previously unknown vulnerabilities in high-performance computer chips that could lead to failures in …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104053/person-400x200.jpg)
Cybercrime gangs continue to innovate to hide their crimes
According to the APWG’s new Phishing Activity Trends Report, after spiking in the spring, phishing has been taking place at a steady pace — but phishers are using new …
Week in review: Hardware Trojans, Office 365 compromise prevention, getting the most out of pentesting
Here’s an overview of some of last week’s most interesting news and articles: Deception technology: Authenticity and why it matters An overview of the central role …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095925/botnet-400x200.jpg)
Attackers increasingly exploiting vulnerabilities to enlarge their IoT botnets
Attackers looking to add IoT devices to their botnets are increasingly adding vulnerability exploitation to their attack arsenal, Netscout researchers warn. Instead on just …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations