Help Net Security
Triggering deep vulnerabilities using symbolic execution
Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic values to evaluate a large set of parallel program paths …
Palo Alto Networks acquires Morta Security
Palo Alto Networks has acquired Morta Security, a Silicon Valley-based cybersecurity company operating in stealth mode since 2012. Financial terms of the acquisition were not …
Stealing money from ATMs with malware
This talk from the 30th Chaos Communication Congress will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The …
The futility of all vendor predictions
As the New Year starts, many people look forward to what it will bring, and for many this involves looking at upcoming budgets and deciding on what to spend the money …
Microsoft releases BYOD best practices for enterprise workers
Microsoft is releasing best practices for enterprise workers who are considering using their personal technology device for work and play. This business trend, known as BYOD, …
New Linksys 802.11AC WRT router allows open source customization
Linksys is bringing back the heritage of the best-selling router of all time – the Linksys WRT54G but updated and modernized it with the most leading edge available …
SanDisk releases 64GB wireless flash drive
SanDisk announced the 64GB SanDisk Connect Wireless Flash Drive. In addition, recently released software updates enhance the performance and functionality of both the SanDisk …
Bruce Schneier becomes CTO of Co3 Systems
Co3 Systems announced that Bruce Schneier has officially joined the company in the role of its first CTO. Schneier joins Co3 after spending seven years as BT’s Chief …
Seagate’s 2TB external hard drive now backs up your phone
Seagate today announced the second generation of its sleek external storage lineup, Seagate Backup Plus Slim. This new offering includes the backup software, Seagate …
IT spending to grow in 2014
Worldwide IT spending is projected to total $3.8 trillion in 2014, a 3.1 percent increase from 2013 spending of $3.7 trillion, according to the latest forecast by Gartner, …
D-Link releases DIY surveillance solution
D-Link today expanded its line of IP surveillance solutions with the new mydlink Network Video Recorder with HDMI output (DNR-312L), providing a DIY surveillance solution for …
The growing hacking threat to e-commerce websites, part 2
In the first part of my article, I briefly revised attackers’ motivations to compromise your website. In this part, I will discuss how websites get hacked, how you can …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations