![binary](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195642/binary-208216_1280-400x200.jpg)
Widespread API use heightens cybersecurity risks
A new Imperva survey showed a heightened concern for cybersecurity risk related to API use. Specifically, 63 percent of respondents are most worried about DDoS threats, bot …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102007/cisco-400x200.jpg)
Cisco plugs critical hole in many of its enterprise security appliances
There’s an eminently exploitable remote code execution flaw in the Adaptive Security Appliance (ASA) Software running on a number of Cisco enterprise appliances, and …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102012/hand_computer-400x200.jpeg)
How to prepare for the future of digital extortion
Digital extortion has evolved into the most successful criminal business model in the current threat landscape, and Trend Micro researchers predict that it will continue to …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
Dridex gang follows trends, also created FriedEx ransomware
The gang behind the infamous banking Trojan Dridex has also created the FriedEx (aka BitPaymer) ransomware, ESET researchers confidently claim. The similarities between Dridex …
UK critical operators risk £17m fines for poor cybersecurity practices
UK essential service operators risk fines of up to £17 million if they fail to implement robust protections against cyber attack. The penalties will apply to energy, …
![Bitcoin](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103019/bitcoin-400x200.jpeg)
British cryptocurrency traders robbed of Bitcoin at gunpoint
Cryptocurrency heists are usually covert affairs that leave users with empty wallets, but not fearing for their life. Still, there are always some unlucky individuals who get …
![fingerprint](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112928/fingerprint-400x200.jpg)
Lenovo Fingerprint Manager Pro is full of fail
Lenovo Fingerprint Manager Pro, a piece of software that allows users to log into their PCs or authenticate to configured websites using fingerprint recognition, has been …
![map fitness activity Strava](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102022/strava-map-activity-400x200.jpg)
Strava user heatmap reveals patterns of life in western military bases
In November 2017, online fitness tracker Strava published a heatmap of the activity many of its users around the world engage in (and track) daily. But what might have seemed …
![Waterfall Security](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102025/waterfall-400x200.jpg)
Waterfall Security and HCNC collaborate to provide OSIsoft PI offerings to the Korean market
Waterfall Security Solutions, a global leader in cybersecurity technologies for critical infrastructure and industrial control systems, announced a partnership with HCNC Co., …
![IBM identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102027/ibm-identity-400x200.jpg)
Authentication today: Moving beyond passwords
A new global study from IBM Security examining consumer perspectives around digital identity and authentication, found that people now prioritize security over convenience …
![snake](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105517/snake-400x200.jpg)
How can we avoid another record year for breaches and ransomware?
More than 14.5 billion emails laced with malware were sent in 2017 according to the annual Global Security Report issued by AppRiver. The majority of cyber threats were …
![PCI DSS](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102031/pci_dss-400x200.jpg)
PCI DSS 3.2 will unveil compliance cramming culture
February 1, 2018 marks the deadline for businesses to adopt the new industry standard, PCI DSS 3.2, aimed at reducing and better responding to cyber attacks resulting in …
Featured news
Resources
Don't miss
- 6 considerations for 2025 cybersecurity investment decisions
- BlackLock ransomware onslaught: What to expect and how to fight it
- Cybercriminals shift focus to social media as attacks reach historic highs
- The risks of autonomous AI in machine-to-machine interactions
- Balancing cloud security with performance and availability