![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113133/bomb-400x200.jpg)
Data breaches hit all-time record high, increase 40% in 2016
The number of U.S. data breaches tracked in 2016 hit an all-time record high of 1,093, according to a new report by the Identity Theft Resource Center (ITRC) and CyberScout. …
![explode](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113434/explode-400x200.jpg)
New infosec products of the week: January 20, 2017
Twistlock 1.7 comes with new runtime defense architecture Twistlock unveiled a new runtime defense architecture for its Twistlock 1.7 container security platform that enables …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105327/vulnerability-400x200.jpg)
Advancing a standard format for vendors to disclose cybersecurity vulnerabilities
Technology providers and their customers are joining forces to advance a standard format for vendors to disclose cybersecurity vulnerabilities. The work of the new OASIS …
![talk](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113748/talk-400x200.jpg)
Most employees use unsanctioned group chat tools
Employees are sharing sensitive company information using group chat tools that are not officially sanctioned for use, according to SpiderOak. The survey consisted of 600 …
![Abstract 7](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105323/spore-400x200.jpg)
Spora ransomware could become the new Locky
A recent decrease of Locky ransomware infections has been tied with the lack of activity of the Necurs botnet, which is used to deliver the malware directly to potential …
![Oracle](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195004/oracle-cloud-400x200.jpg)
Massive Oracle Critical Patch Update fixes 270 vulnerabilities
Oracle has released the first Critical Patch Update scheduled for 2017, and it’s massive. It fixes 270 vulnerabilities across multiple products, and over 100 of them are …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195011/apple-400x200.jpg)
Apple’s malware problem is accelerating
For a long time, one of the most common reasons for buying an Apple computer over a Windows-based one was that the former was less susceptible to viruses and other malware. …
![Kali Linux](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194946/kali-400x200.png)
Kali Linux certification, first official Kali book on the horizon
The Kali Linux distribution celebrates its 10th anniversary this year. The hugely popular open source project, maintained by Offensive Security, announced today that its new …
![signature](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105329/signature-400x200.jpg)
Use a smartwatch to verify handwritten signatures and detect forgeries? Sure!
A new system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries has been developed by Ben-Gurion University …
![lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110827/lights-400x200.jpg)
Growing risk associated with mobile and IoT application security
Despite widespread concern about the security of mobile and Internet of Things applications, organizations are ill-prepared for the risks they pose, according to research …
![shopping](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105726/shopping_cart-400x200.jpg)
Retailers largely lack on-site security and IT expertise
A new Cybera survey of more than 50 retail professionals found that many retailers lack the necessary IT staff at the store level to ensure proper solution implementation and …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113415/apple-1-400x200.jpg)
Fruitfly: Unusual Mac backdoor used for tightly targeted attacks?
Researchers have found and analyzed a Mac backdoor that is unusual in many ways. The malware – detected as OSX.Backdoor.Quimitchin by Malwarebytes but dubbed Fruitfly by …
Featured news
Sponsored
Don't miss
- Ransomware gang targets IT workers with new RAT masquerading as IP scanner
- Researchers unearth MotW bypass technique used by threat actors for years
- ITSM concerns when integrating new AI services
- Scaling data security solutions: What you need to know
- Whitepaper: Tools to tackle the multicloud environment