searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus

Google releases Android 13 with improved privacy and security features

Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

research

Get our top stories in your inbox

Linksys Smart Wi-Fi routers full of flaws, but temporary fix is available

April 20, 2017

Over 20 models of Linksys Smart Wi-Fi routers have been found to have vulnerabilities that, if exploited, could allow attackers to overload a router and force a reboot, deny …

Attackers can steal smartphone users’ PINs by tapping into data collected by mobile sensors

April 12, 2017

Researchers have demonstrated that a malicious website or app could work out smartphone users’ PINs or passwords based just on the data collected by various motion …

CLDAP reflection attacks generate up to 24 Gbps of traffic

April 12, 2017

Akamai researchers Jose Arteaga and Wilber Majia have identified a new Connection-less Lightweight Directory Access Protocol (CLDAP) reflection and amplification method. CLDAP …

Similarities in partial fingerprints may trick biometric security systems

April 11, 2017

No two people are believed to have identical fingerprints, but researchers at the New York University Tandon School of Engineering and Michigan State University College of …

Modern security programs: Artificial intelligence and machine learning

March 29, 2017

A new research report by Carbon Black aggregates insight from more than 400 interviews with leading cybersecurity researchers who discussed non-malware attacks, artificial …

Unpatched flaw opens Ubiquiti Networks devices to compromise

March 17, 2017

A critical vulnerability in many of Ubiquiti Networks’ networking devices can be exploited by attackers to take over control of the device and, if that device acts as a …

Fileless attack framework was used in many recent attacks

March 17, 2017

In the last month or so, a number of security companies spotted attackers targeting a variety of organizations around the world with spear-phishing emails delivering …

Double Robotics Telepresence Robot can be hacked

March 14, 2017

Rapid7 researchers have discovered a number of vulnerabilities in the Double Robotics Telepresence Robot, the company’s iPad-based telepresence device that looks a bit …

Android devices delivered to employees with pre-installed malware

March 13, 2017

A test of Android devices used in two unnamed companies revealed that 38 of them were infected with malware before being delivered to the employees. These were smartphones by …

185,000+ vulnerable Wi-Fi cameras just waiting to be hijacked

March 9, 2017

A generic wireless camera manufactured by a Chinese company and sold around the world under different names and brands can be easily hijacked and/or roped into a botnet. The …

Encrypted messaging app Confide suffers from many security issues

March 8, 2017

Confide, the encrypted instant messaging application with a self-destructing messaging system that has become popular with White House staffers, is not so secure after all. …

Western Digital My Cloud NAS devices wide open to attackers

March 8, 2017

Western Digital My Cloud NAS devices have again been found wanting in the security department, as two set of researchers have revealed a number of serious flaws in the …

Posts navigation

1 … 27 28 29 30 31 32 33 34 35 36

Featured news

  • Why organizations should control Active Directory permissions
  • How to manage the intersection of Java, security and DevOps at a low complexity cost
  • Tackling the dangers of internal communications: What can companies do?
Cisco has been hacked by a ransomware gang

What's new

Google releases Android 13 with improved privacy and security features

DigitalOcean customers affected by Mailchimp “security incident”

Overcoming the roadblocks to passwordless authentication

Why organizations should control Active Directory permissions

Don't miss

DigitalOcean customers affected by Mailchimp “security incident”

1,900 Signal users exposed following Twilio breach

Overcoming the roadblocks to passwordless authentication

Why organizations should control Active Directory permissions

Matter protocol: Secure, reliable interoperability for smart home devices

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Tackling the dangers of internal communications: What can companies do?
  • The challenges of managing the modern external attack surface
  • Understanding your attack surface is key to recognizing what you are defending
  • Machine learning creates a new attack surface requiring specialized defenses

(IN)SECURE Magazine ISSUE 72 (July 2022)

  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise