![cloud computing](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113632/cloud_computing-400x200.png)
Cloud IT infrastructure spend grew to $32.6 billion in 2016
According to IDC, vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew by 9.2% …
![arrow](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112324/arrow2-400x200.jpg)
Week in review: Highest paying IT certifications, emergency iOS patch, and how attackers exploit whitelists
Here’s an overview of some of last week’s most interesting news and articles: Windows 10 Creators Update will come with clearer privacy options Nearly two years …
![QNAP QTS](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104557/qnap_qts-400x200.jpg)
QNAP NAS devices open to remote command execution
If you’re using one of the many QNAP NAS devices and you haven’t yet upgraded the QTS firmware to version 4.2.4, you should do so immediately if you don’t …
![AppStore scam](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104600/scam-appstore-400x200.jpg)
Your iPhone is not infected, and you don’t need a free VPN app to clean it
To be sure that your online browsing is protected and your data is secure, you have to be able to trust the VPN service of your choice. But, as a research into Android VPN …
![WordPress](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104602/wordpress-biohazard-400x200.jpg)
20,000-bots-strong Sathurbot botnet grows by compromising WordPress sites
A 20,000-bots-strong botnet is probing WordPress sites, trying to compromise them and spread a backdoor downloader Trojan called Sathurbot as far and as wide as possible. …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112242/abstract-400x200.jpg)
Threat intelligence sharing challenges: Understand the context of cyber events
A new McAfee report details the challenges facing threat intelligence sharing efforts. The growing complexity of the technology environment is a very important driver for …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
Oil and gas companies’ cybersecurity strategies are evolving
Lacking enterprise-wide cyber analytics technology to monitor for cyberattacks, most oil and gas companies are not fully aware of when or even how cyberattacks might affect …
![Keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195431/keyboard-400x200.jpg)
New infosec products of the week: April 7, 2017
A rules engine that adapts to changing attack patterns DataVisor announced the latest addition to its full stack analytics platform, the DataVisor Automated Rules Engine, a …
![Hybrid infrastructure services](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104611/hybrid_infrastructure_services-400x200.jpg)
Extensive shift to hybrid infrastructure services is underway
The growth of cloud and industrialized services and the decline of traditional data center outsourcing (DCO) indicate a massive shift toward hybrid infrastructure services, …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112017/labyrinth-400x200.jpg)
How attackers exploit whitelists
If there is a technology or security measure that can help organizations protect their assets from attackers or malware, you can be sure that attackers will try to find a way …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104605/windows-400x200.jpg)
Windows 10 Creators Update will come with clearer privacy options
Nearly two years after Microsoft released Windows 10, the company has finally revealed what data it collects from users. The revelation comes as part of a recent change of the …
![iCloud](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104607/icloud-400x200.png)
“iCloud Mail” phishing emails doing rounds
The latest email phishing campaign targeting Apple users is aimed at gathering as much information as possible from unfortunate victims. The email, made to look like it comes …
Featured news
Sponsored
Don't miss
- ITSM concerns when integrating new AI services
- Scaling data security solutions: What you need to know
- Whitepaper: Tools to tackle the multicloud environment
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates