Help Net Security
Week in review: Flash, IE 0-days exploited in the wild, vulnerable routers, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: (IN)SECURE Magazine issue 41 released (IN)SECURE Magazine is a …
Qualys CEO to deliver keynote at RSA Conference 2014
Qualys chairman and CEO Philippe Courtot will deliver a keynote speech at the upcoming RSA Conference 2014 on Thursday, February 27 at 3:30 p.m. PT. Security professionals in …
Security vulnerabilities found in 80% of best-selling SOHO wireless routers
Tripwire has analyzed the security provided by the most popular wireless routers used in many small and home offices and found that 80 percent of Amazon’s top 25 …
The growth and complexity of mobile threats
As employees continue to use their own devices and personal applications for work purposes, more threats are introduced into the workplace, putting company networks at risk. …
Adobe fixes Flash 0-day
Adobe released their second out-of-band update for Adobe Flash this month. APSB14-07 fixes three vulnerabilities in Adobe Flash, including CVE-2014-0502 which is being used in …
Despite costs, organizations overlook new threats
A new generation of unknown security threats stemming from megatrends and technologies like BYOD, mobility, cloud computing, and Internet usage, as well as internal actions …
Mobile threats around the world
2013 was a year of change in the world of mobile threats. Campaigns became increasingly targeted as criminals adapted their practices to maximize profit and operate under the …
Major vulnerability in Tinder dating app allowed user tracking
Include Security unveiled new research showing that users of the popular online dating app Tinder were at significant risk due to a vulnerability they discovered in the …
96 percent of apps have security vulnerabilities
Improvements in patch deployment and secure coding practices have made a slight impact on the incidence of vulnerabilities, according to a new Cenzic report. However, the …
Yara signatures for Careto, the Masked APT
Last week, Kaspersky Lab released their research (Unveiling Careto – The Masked APT) on a fresh APT campaign, which is supposed to had been running for several years. …
60% of enterprises relying on sysadmins to self-police SSH keys
Enterprises tolerate security vulnerabilities by allowing open door, root-level access, according to a new Ponemon Institute report. 46% of the 1,854 respondents reported …
400 iOS and Android apps analyzed for privacy and security risks
A new report analyzes the behaviors of the top 400 iOS and Android apps to assess the state of mobile app security and identify trends impacting consumers and enterprises with …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations