![shop online](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105902/shop-online-400x200.jpg)
Explosion of look-alike domains aims to steal sensitive data from online shoppers
Venafi released research on the explosion of look-alike domains, which are routinely used to steal sensitive data from online shoppers. Venafi’s research analyzed suspicious …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110851/brain-400x200.jpg)
New tools from IBM and Google reveal it’s hard to build trust in AI
The unseen dangers inherent in artificial intelligence (AI) are proving the importance of IBM and Google’s diverse approach to this multifaceted problem. Brad Shimmin and …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195355/general_red-400x200.jpg)
Week in review: First-ever UEFI rootkit, Apple DEP vulnerability, new tactics subvert traditional security measures
Here’s an overview of some of last week’s most interesting news and articles: What do you mean by storage encryption? Depending on the threat context and how you …
![Sysdig](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100105/sysdig3-400x200.jpg)
New infosec products of the week: September 28, 2018
Chronicle announces VirusTotal Enterprise with greater search and analysis capabilities Chronicle, the cybersecurity subsidiary of Google’s parent company Alphabet, has …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105608/danger-400x200.jpg)
Phorpiex bots target remote access servers to deliver ransomware
Threat actors are brute-forcing their way into enterprise endpoints running server-side remote access applications and attempting to spread the GandCrab ransomware onto other …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100109/industrial-400x200.jpg)
Vulnerabilities and architectural considerations in industrial control systems
The reason SCADA security is so controversial stems primarily from the intense consequences that come from a compromise in this area. In this podcast, Andrew Ginter, VP of …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112931/car-hacking-400x200.jpg)
Connected car security is improving, researchers say
The automotive industry has apparently stepped up their game when it comes to improving connected car security. According to the latest IOActive report, which was compiled …
![magnifying glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195300/magnifying-glass-400x200.png)
An investigation into how cyber ready businesses really are
The more cyber ready a business becomes, the better its overall business outcomes. Vodafone’s Cyber Ready Barometer notes 48% of cyber ready businesses are reporting more than …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100112/healthcare-400x200.jpg)
Hackers are finding creative ways to target connected medical devices
Hackers are leveraging error messages from connected medical devices — including radiology, X-ray and other imaging systems — to gain valuable insights, according to Zingbox. …
![key](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100900/key-400x200.jpg)
Organizations apply stronger PKI security controls due to their increasingly critical role
The Internet of Things is the fastest growing trend driving the deployment of applications that use public key infrastructure as evidenced by the Thales 2018 Global PKI Trends …
![The Linux Foundation](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100123/linux_foundation-400x200.jpg)
Are communications service providers confident in open source networking solutions?
The Linux Foundation announced the results of an industry survey to gauge industry perceptions of open source across networking technologies. Top takeaways from the survey …
![alert](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105208/alert-400x200.jpg)
LoJax: First-ever UEFI rootkit detected in a cyberattack
ESET researchers have discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers. Dubbed LoJax, this rootkit was part of a campaign …