Help Net Security
The time for responsible reporting has come
The beginning of the year is when budgets for the forthcoming year are made available, when many new projects are teed off, and the security conference season starts. It is …
Password Manager Pro gets SAML 2.0 support
ManageEngine has added SAML 2.0 support to Password Manager Pro. The move strengthens the user authentication mechanism in Password Manager Pro, enabling integration with …
Week in review: Flash, IE 0-days exploited in the wild, vulnerable routers, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: (IN)SECURE Magazine issue 41 released (IN)SECURE Magazine is a …
Qualys CEO to deliver keynote at RSA Conference 2014
Qualys chairman and CEO Philippe Courtot will deliver a keynote speech at the upcoming RSA Conference 2014 on Thursday, February 27 at 3:30 p.m. PT. Security professionals in …
Security vulnerabilities found in 80% of best-selling SOHO wireless routers
Tripwire has analyzed the security provided by the most popular wireless routers used in many small and home offices and found that 80 percent of Amazon’s top 25 …
The growth and complexity of mobile threats
As employees continue to use their own devices and personal applications for work purposes, more threats are introduced into the workplace, putting company networks at risk. …
Adobe fixes Flash 0-day
Adobe released their second out-of-band update for Adobe Flash this month. APSB14-07 fixes three vulnerabilities in Adobe Flash, including CVE-2014-0502 which is being used in …
Despite costs, organizations overlook new threats
A new generation of unknown security threats stemming from megatrends and technologies like BYOD, mobility, cloud computing, and Internet usage, as well as internal actions …
Mobile threats around the world
2013 was a year of change in the world of mobile threats. Campaigns became increasingly targeted as criminals adapted their practices to maximize profit and operate under the …
Major vulnerability in Tinder dating app allowed user tracking
Include Security unveiled new research showing that users of the popular online dating app Tinder were at significant risk due to a vulnerability they discovered in the …
96 percent of apps have security vulnerabilities
Improvements in patch deployment and secure coding practices have made a slight impact on the incidence of vulnerabilities, according to a new Cenzic report. However, the …
Yara signatures for Careto, the Masked APT
Last week, Kaspersky Lab released their research (Unveiling Careto – The Masked APT) on a fresh APT campaign, which is supposed to had been running for several years. …
Featured news
Resources
Don't miss
- Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say
- Portmaster: Open-source application firewall
- Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)
- How a noisy ransomware intrusion exposed a long-term espionage foothold
- Creative cybersecurity strategies for resource-constrained institutions