• (IN)SECURE Magazine
  • About us
  • Contact

  • Start
  • News
  • Articles
  • Malware
  • Reviews
  • Events
  • Whitepapers
  • Newsletters
  • Start
  • News
  • Articles
  • Malware
  • Reviews
  • Events
  • Whitepapers
  • Newsletters
Don't miss:
Expand vulnerability and risk management programs to eliminate security misconfigurations
GDPR: It’s an issue of transparency
Most dangerous attack techniques, and what’s coming next
Get our Top Stories to your inbox
 

Featured news

  • Expand vulnerability and risk management programs to eliminate security misconfigurations
  • GDPR: It’s an issue of transparency
  • Most dangerous attack techniques, and what’s coming next
  • IT workforce increasingly overworked and stressed out
  • Energy security pros worry about catastrophic failure due to cyberattacks
  • When BEC scammers specialize
  • NIST releases Cybersecurity Framework 1.1
  • Cisco plugs critical hole in WebEx, users urged to upgrade ASAP
  • LocalBlox found leaking info on tens of millions of individuals
  • Open-source library for improving security of AI systems
  • Researchers propose scheme to secure brain implants
  • New targeted surveillance spyware found on Google Play

hacktivism

Get our Top Stories to your inbox
Cisco

Hackers leverage flaw in Cisco switches to hit Russian, Iranian networks

  • April 9, 2018
  • Cisco
  • exploit
  • hack

The proof-of-concept exploit code for a vulnerability affecting many Cisco switches has been leveraged by vigilante hackers to mess with networks and data-centers in Russia …

mask

British teenager hacked top ranking US officials using social engineering

  • January 22, 2018
  • hacktivism
  • social engineering
  • UK

How did British teenager Kane Gamble, who at the time was only 15 years old, manage to break into email accounts of the CIA and DNI chiefs, as well as gain access to a number …

eye

Hackers explain how they “owned” FlexiSpy

  • April 26, 2017
  • data breach
  • data leak
  • hacktivism

How did the hackers that go by the name Decepticons breach stalkerware manufacturer FlexiSpy? According to information purportedly provided by the attackers themselves, it …

arrest

Hacker Phineas Fisher arrested in Spain?

  • February 1, 2017
  • arrest
  • Europe
  • hacking

Has Phineas Fisher, the person (or group) behind the Gamma International and Hacking Team breaches and data leaks, been caught? According to Catalan news outfit ARA, three …

USA flag

UK Home Secretary signs extradition order for British hacker Lauri Love

  • November 15, 2016
  • hacking
  • hacktivism
  • law

The extradition order for British hacker Lauri Love has been signed on Monday by the UK Home Secretary Amber Rudd, and Love has 14 days to appeal the decision. The 31-year-old …

Search

Rise of cyber attacks against the public sector

  • September 23, 2016
  • cybercriminals
  • data protection
  • hacktivism

The use of information and communication technologies in the public sector, specifically online government services, is a key factor for being targeted by cybercriminals. …

Book: Cyber Guerilla

Review: Cyber Guerilla

  • August 11, 2016
  • Anonymous
  • book
  • cyberconflict

About the authors Jelle Van Haaster is an officer in the Royal Netherlands Army and has a background in legal, military, and technical defense matters. Rickey Gevers is …

Report: The changing face of hacking

Hacker Guccifer 2.0 claims DNC hack, leaks documents to prove it

  • June 16, 2016
  • data breach
  • data leak
  • hacktivism

An individual that goes by the handle “Guccifer 2.0” has claimed responsibility for the US Democratic National Committee (DNC) hack, and has released documents …

Report: The changing face of hacking

Phineas Fisher records, publishes latest attack

  • May 20, 2016
  • data breach
  • data leak
  • Hacking Team

Phineas Fisher, the hacker behing the Gamma International and Hacking Team breaches and data leaks, is at it again. This time his target was Sindicat de Mossos …

Report: The changing face of hacking

Hacking Team hacker explains how he did it

  • April 18, 2016
  • data breach
  • Hacking Team
  • hacktivism

Some nine moths ago, a hacker that calls himself Phineas Fisher managed to breach the systems and networks of Hacking Team, the (in)famous Italian company that provides …

Posts navigation

1 2 3 4 5 6 … 15 Next
danger

Most dangerous attack techniques, and what’s coming next

  • How attackers can exploit iTunes Wi-Fi sync to gain lasting control of target devices
  • Researchers propose scheme to secure brain implants
  • Researchers develop algorithm to detect fake users on social networks
  • US, UK warn Russians hackers are compromising networking devices worldwide
Spot
light
When BEC scammers specialize

What's New

person

IT workforce increasingly overworked and stressed out

danger

Most dangerous attack techniques, and what’s coming next

door

Expand vulnerability and risk management programs to eliminate security misconfigurations

architecture

GDPR: It’s an issue of transparency

Industry

Energy security pros worry about catastrophic failure due to cyberattacks

Don't miss

door

Expand vulnerability and risk management programs to eliminate security misconfigurations

architecture

GDPR: It’s an issue of transparency

danger

Most dangerous attack techniques, and what’s coming next

person

IT workforce increasingly overworked and stressed out

Industry

Energy security pros worry about catastrophic failure due to cyberattacks

maritime shipping

When BEC scammers specialize

critical infrastructure

NIST releases Cybersecurity Framework 1.1

Cisco WebEx

Cisco plugs critical hole in WebEx, users urged to upgrade ASAP

Facepalm

LocalBlox found leaking info on tens of millions of individuals

brain

Researchers propose scheme to secure brain implants

eye

New targeted surveillance spyware found on Google Play

crypto currency

Cryptominers displace ransomware as the number one threat

 
(IN)SECURE Magazine

Newsletters

Subscribe to get regular updates from Help Net Security. The weekly newsletter contains a selection of the best stories, while the daily newsletter highlights all the latest headlines!

  • Start
  • News
  • Malware
  • Articles
  • Reviews
  • Events
  • Copyright 1998-2018 by Help Net Security
  • Read our privacy policy
  • About us
  • Advertise
  • Design by FatDUX

  • Start
  • News
  • Articles
  • Malware
  • Reviews
  • Events
  • Whitepapers
  • Newsletters

Copyright 1998-2018 by Help Net Security | Read our privacy policy | About us | Advertise

Design by FatDUX