Help Net Security
Security vulnerabilities found in 80% of best-selling SOHO wireless routers
Tripwire has analyzed the security provided by the most popular wireless routers used in many small and home offices and found that 80 percent of Amazon’s top 25 …
The growth and complexity of mobile threats
As employees continue to use their own devices and personal applications for work purposes, more threats are introduced into the workplace, putting company networks at risk. …
Adobe fixes Flash 0-day
Adobe released their second out-of-band update for Adobe Flash this month. APSB14-07 fixes three vulnerabilities in Adobe Flash, including CVE-2014-0502 which is being used in …
Despite costs, organizations overlook new threats
A new generation of unknown security threats stemming from megatrends and technologies like BYOD, mobility, cloud computing, and Internet usage, as well as internal actions …
Mobile threats around the world
2013 was a year of change in the world of mobile threats. Campaigns became increasingly targeted as criminals adapted their practices to maximize profit and operate under the …
Major vulnerability in Tinder dating app allowed user tracking
Include Security unveiled new research showing that users of the popular online dating app Tinder were at significant risk due to a vulnerability they discovered in the …
96 percent of apps have security vulnerabilities
Improvements in patch deployment and secure coding practices have made a slight impact on the incidence of vulnerabilities, according to a new Cenzic report. However, the …
Yara signatures for Careto, the Masked APT
Last week, Kaspersky Lab released their research (Unveiling Careto – The Masked APT) on a fresh APT campaign, which is supposed to had been running for several years. …
60% of enterprises relying on sysadmins to self-police SSH keys
Enterprises tolerate security vulnerabilities by allowing open door, root-level access, according to a new Ponemon Institute report. 46% of the 1,854 respondents reported …
400 iOS and Android apps analyzed for privacy and security risks
A new report analyzes the behaviors of the top 400 iOS and Android apps to assess the state of mobile app security and identify trends impacting consumers and enterprises with …
Cost of Target data breach exceeds $200 million
Financial institutions continue to respond to the massive data breach at Target. According to data collected by the Consumer Bankers Association (CBA) and the Credit Union …
Lessons learned from blocking 100 million cyber attacks
Using real-life data from the 100m+ malicious hack attempts FireHost blocked in the last 12 months, they produced a Superfecta report which contains a quarter-by-quarter guide …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous