searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

hijacking

Get our top stories in your inbox

Malvertising campaign compromises routers instead of computers

December 16, 2016

The DNSChanger exploit kit is back and more effective than ever, and is being used in a widespread malvertising attack whose goal is to compromise small/home office routers. …

Icarus takes control of drones by impersonating their operators

October 27, 2016

Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a …

Beware of browser hijacker that comes bundled with legitimate software

August 12, 2016

Lavians, a “small software vendor team,” is packaging its offerings with a variant of browser-hijacking malware Bing.vc. The company sells and offers for free …

Critical ScreenOS bugs allow undetectable decryption of VPN connections, device hijacking

December 18, 2015

Juniper Networks has discovered and patched a critical, high-impact vulnerability affecting ScreenOS on its NetScreen devices, and is advising customers to update their …

Posts navigation

1 2
bot

Proliferation of sneakerbots across industries: The long tail of DIY bot operators

  • Preparing for the Cybersecurity Maturity Model Certification onslaught
  • Protecting the digital workplace with an integrated security strategy
Free certification Exam Action Plan from (ISC)²

What's new

linux tux

Now-fixed Linux kernel vulnerabilities enabled local privilege escalation (CVE-2021-26708)

Microsoft Exchange

Exchange Servers targeted via zero-day exploits, have yours been hit?

10 CISO strategies

10 strategies small security teams can use for effective cybersecurity management

work from home

Enterprises observing uptick in risky behaviors since shift to remote work

Don't miss

Microsoft Exchange

Exchange Servers targeted via zero-day exploits, have yours been hit?

bot

Proliferation of sneakerbots across industries: The long tail of DIY bot operators

10 CISO strategies

10 strategies small security teams can use for effective cybersecurity management

puzzle

Preparing for the Cybersecurity Maturity Model Certification onslaught

malware

Multi-payload Gootloader platform stealthily delivers malware and ransomware

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • How do I select a cloud security solution for my business?
  • Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
  • How do I select a network monitoring solution for my business?
  • Tips for boosting the “Sec” part of DevSecOps

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise