Help Net Security
Week in review: WhatsApp data collection, roadblocks to implementing CISA, and how US law enforcement uses Stingrays
Here’s an overview of some of last week’s most interesting news and articles:European Parliament members want member states to protect Edward SnowdenToo little has …
10 tips to avoid viruses on Halloween
As we get closer to Halloween, hackers take advantage of the most popular Hollywood titles to launch so-called BlackHat SEO attacks, i.e. false Google and other search engine …
Second teenager arrested in connection with TalkTalk hack
Police have arrested a second teenage boy in connection with the investigation into alleged data theft from TalkTalk.On Thursday, 29 October, detectives from the Metropolitan …
Real-world roadblocks to implementing CISA
The recent approval of CISA (the Cybersecurity Information Sharing Act) by the US Congress and Senate is paving the way for broader security collaboration. There is a rapidly …
China is the top target for DDoS reflection attacks
China bore the brunt of DDoS reflection attacks last month, with 61 percent of the top attack destinations observed hitting Chinese-based systems, according to Nexusguard. Of …
Online Trust Alliance releases new Internet of Things Trust Framework
The Online Trust Alliance (OTA) updated the IoT Trust Framework, a comprehensive global initiative that provides guidance for device manufacturers and developers to enhance …
CoinVault and Bitcryptor ransomware victims don’t need to pay the ransom
Kaspersky Lab has added an additional 14,031 decryption keys to their free repository, enabling all those who have fallen victim to CoinVault and Bitcryptor ransomware to …
Most are unaware of the seriousness of medical data theft
Most remain unaware of their vulnerability to medical data theft, and the fact that it can be far more damaging than credit card or social security number compromise, …
The top threat vector for mobile devices? Porn
As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking increasingly vicious and disturbingly personal shots at …
Creating a secure network for the Internet of Things
The attitudes and perceptions around the Internet of Things (IoT) span a wide array of views from the extreme excitement of consumers and manufacturers, to the concerns …
New DDoS attacks misuse NetBIOS name server, RPC portmap, and Sentinel licensing servers
Akamai has observed three new reflection DDoS attacks in recent months: NetBIOS name server reflection, RPC portmap reflection, and Sentinel reflection.In a reflection DDoS …
Are IT security pros optimistic or naïve?
Half of IT security practitioners in the U.S. view their organization as an unlikely target for attack, according to a Ponemon Institute survey of 614 IT security …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance