Help Net Security
OpenSSH 7.0 deprecates weak, legacy and unsafe cryptography
OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, it provides secure tunneling …
Revisiting takedown wins: Are users in the developing world getting left behind?
We have all seen the headlines: another botnet dismantled, and we can all rest easy that the threat that has been plaguing us for all those years is now no longer an issue. …
Looks like mobile device security is on nobody’s mind
Despite recent high-profile data theft attacks, much of the American workforce has not taken action to protect information on their personal and corporate-issued devices. …
Firefox 40: New features and critical security updates
Mozilla released Firefox 40. The update includes four critical, seven high and two moderate security updates. The new release now issues a warning if you visit a page known to …
Kali Linux 2.0 released: New 4.0 kernel, improved hardware and wireless driver coverage
Kali Linux, the open source penetration testing platform, has reached version 2.0.Kali Linux 2.0 comes with a 4.0 kernel, now based on Debian Jessie. It features improved …
Top 10 U.S. cities for online fraud
Data reveals Tampa as the top hot spot for online fraud and ThreatMetrix found a correlation between top cities for fraud and those home to hosted data centers. The top 10 …
Darkhotel spying crew boosts attacks with Hacking Team exploit
Kaspersky Lab has discovered that the Darkhotel group, an elite spying crew uncovered by its experts in 2014 and famous for infiltrating Wi-Fi networks in luxury hotels to …
IoT devices: The good, the bad and the ugly
Cognosec has revealed critical security flaws in ZigBee, one of the most popular wireless communication standards used by Internet of Things (IoT) devices today.Speaking at …
Defending the enterprise in an increasingly complex environment
Technology has transformed the way organisations work and its evolution is now faster than ever before. The promise of IT transformation presents many opportunities for …
HTC phone stores fingerprints in easily accessible plaintext
Pressing a finger on your mobile phone’s fingerprint scanner has to be the easiest, most seamless way to unlock the device, and this is why more and more manufacturers …
Week in review: New OS X threats, and how to protect your privacy on Windows 10
Here’s an overview of some of last week’s most interesting news and articles:What’s the state of your software?In the face of the repeated high profile breaches of …
EFF’s Privacy Badger prevents users being tracked online
The Electronic Frontier Foundation has finally released version 1.0 of Privacy Badger, a browser extension that blocks some of the sneakiest trackers that try to spy on your …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)