Help Net Security
Security weakness found in WiFi enabled LED light bulb
Researchers at Context Information Security have been able to expose a security weakness in a WiFi enabled, energy efficient LED light bulb that can be controlled from a …
Week in review: DDoS attacks becoming more effective, and how to build trust between business and IT
Here’s an overview of some of last week’s most interesting news, articles and interviews: Gathering and using threat intelligence In this interview, Tomer Teller, …
Microsoft to address six issues on Tuesday
Microsoft has dropped their July 2014 advance security notification and it looks like a relatively light month of patching. Six issues in total, 2 Critical, 3 Important, 1 …
Connecting cloud storage services and cloud-based data loss prevention
CoSoSys released a new version of My Endpoint Protector, a cloud-based Data Loss Prevention (DLP) and Mobile Device Management (MDM) solution for both Macs and PCs. The new …
Spammers are always thinking up new tricks
The percentage of spam in email traffic in May averaged 69.8 per cent – 1.3 percentage points less than the previous month. May saw numerous mass mailings for schools …
Microsoft supports open source software framework for IoT
The AllSeen Alliance, the broadest Internet of Everything open-source project, announced that Microsoft has joined the group’s multi-company effort as a Premier Member …
Live open source security lab coming to Cyber Security EXPO
Cyber Security EXPO, part of IP EXPO Europe, is calling for contributors to the Cyber Hack, a live open source security lab arriving at the show this October. The Hack area …
Exploit switches off Microsoft EMET’s protection features
By leveraging and modifying a “semi-random public exploit” researchers have managed to deactivate all protection features of the latest version of …
Physical location of data will become increasingly irrelevant
The physical location of data still matters, but will become increasingly irrelevant and will be replaced by a combination of legal location, political location and logical …
Facebook SDK flaw allows unauthorized access to Facebook accounts
MetaIntell has uncovered a significant security vulnerability in the Facebook SDK (V3.15.0) for both iOS and Android. Dubbed Social Login Session Hijacking, when exploited …
IEEE launches Anti-Malware Support Service
IEEE announced the launch of IEEE Anti-Malware Support Service (AMSS). A new service from IEEE Standards Association’s (IEEE-SA) Industry Connections Security Group …
Number and diversity of phishing targets continues to increase
The number of phishing sites in the first quarter of 2014 leaped 10.7 percent over the previous quarter, the Anti-Phishing Working Group reports. 2013 was one of the heaviest …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)