searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

research

Get our top stories in your inbox

The operations and economics of organized criminal email groups

May 22, 2018

Nine of the 10 captured organized criminal email groups operate out of Nigeria, they all leverage a multitude of attack methods, and business email compromise (BEC) is far …

The ethical and legal dilemmas of threat researchers

May 21, 2018

Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter …

Careless researchers expose millions of Facebook users’ sensitive data

May 14, 2018

If you needed another reason to stop sharing intimate information with apps on Facebook or Facebook itself, consider this newest revelation: academics at the University of …

Hackers can jump from passenger Wi-Fi to train control networks

May 14, 2018

Setting up a Wi-Fi network for passengers to use is practically a must for railway companies these days. Unfortunately, that welcome add-on for travelers can become a means …

Hacking for fun and profit: How one researcher is making IoT device makers take security seriously

May 10, 2018

We should all be so lucky to enjoy our work as much as Ken Munro does. Generally attracted by research that “looks fun” and particularly interested in probing the …

Exfiltrating private keys from air-gapped cold wallets

April 24, 2018

Air-gapped cold wallets might be one of the safest options for keeping your cryptocurrency stash, but even they can be compromised. And, as demonstrated by security …

Effective intrusion detection for the Internet of Things

April 24, 2018

A group of researchers have devised a self-learning system for detecting compromised IoT devices that does not require prior knowledge about device types or labeled training …

Researchers propose scheme to secure brain implants

April 18, 2018

A group of researchers from KU Leuven, Belgium, have proposed a practical security scheme that would allow secure communications between a widely used implantable …

Researchers develop algorithm to detect fake users on social networks

April 17, 2018

Ben-Gurion University of the Negev and University of Washington researchers have developed a new generic method to detect fake accounts on most types of social networks, …

Real-time detection of consumer IoT devices participating in DDoS attacks

April 16, 2018

Could we detect compromised consumer IoT devices participating in a DDoS attack in real-time and do someting about it? A group of researchers Princeton University have …

Researchers use power lines to exfiltrate data from air-gapped computers

April 13, 2018

Researchers from the Ben-Gurion University of the Negev have come up with another way to exfiltrate data from air-gapped computers: this time, it’s via malware that can …

How security researchers deal with risks stemming from their activities

April 11, 2018

Broad and inconsistent interpretations of behind the times laws, new anti-infosec legislation, lawsuits and criminal prosecutions are having a chilling effect on security …

Posts navigation

1 … 22 23 24 25 26 27 28 29 30 … 38

Featured news

  • These 15 European startups are set to take the cybersecurity world by storm
  • Enhance security while lowering IT overhead in times of recession
  • Why you should treat ChatGPT like any other vendor service
How to protect online privacy in the age of pixel trackers

Sponsored

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

How to scale cybersecurity for your business

Don't miss

These 15 European startups are set to take the cybersecurity world by storm

Enhance security while lowering IT overhead in times of recession

Why you should treat ChatGPT like any other vendor service

2022 witnessed a drop in exploited zero-days

5 rules to make security user-friendly

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us