Help Net Security
Vulnerabilities in 2015: 0-days, Android vs iOS, OpenSSL
Secunia has taken an early peek at the trend in vulnerabilities for 2015, and has presented the results at Black Hat USA 2015. Seven months into the year, the number of …
Getting BYOD right
According to a survey conducted by Kaspersky Lab in conjunction with B2B International, around half of the consumers surveyed also use their devices for work. However, only …
Disrupting trust models: An evolution in the financial services sector
The way we interact with service providers – whether travel organisations, music suppliers or retailers – has changed to be almost unrecognisable from five years’ ago. From …
Easily exploitable Certifi-gate bug opens Android devices to hijacking
Check Point’s mobile security research team discovered a vulnerability in Android that affects phones, tablets and devices made by major manufacturers including LG, …
Photo gallery: Black Hat USA 2015, part 2
The Black Hat USA 2015 conference is underway at the Mandalay Bay Convention Center in Las Vegas. Take a peek at the happenings in the Business Hall.Featured vendors and …
Corporate networks can be compromised via Windows Updates
Yesterday at Black Hat USA 2015, researchers from UK-based Context Information Security demonstrated how Windows Update can be abused for internal attacks on corporate …
Identify and track sensitive corporate data in real-time
InfoGPS Networks revealed at Black Hat USA 2015 software able to identify, classify, and track sensitive data in real-time across the organization. “Cybersecurity software has …
Photo gallery: Black Hat USA 2015 Business Hall
The Black Hat USA 2015 conference is underway at the Mandalay Bay Convention Center in Las Vegas, and the “business” part of the conference is bustling. Featured …
Global hacker competition challenges penetration testers
More than 500 players have registered for an exciting global online hacker challenge taking place this week during Black Hat USA 2015 and DEF CON.Organized by BalaBit, best …
NIST releases SHA-3 cryptographic hash standard
The National Institute of Standards and Technology (NIST) has released the final version of its “Secure Hash Algorithm-3” standard, a next-generation tool for …
Qualys announces free global asset inventory service
At Black Hat USA 2015, Qualys announced the availability of Qualys AssetView, a free cloud-based asset inventory service that enables companies to search for information on …
Phishing attacks targeting businesses are escalating
Phishing attacks have increased by 38 percent overall in Q2 2015, and the growth has been spurred partly by the ever-growing number and sophisticated types of phishing attacks …
Featured news
Resources
Don't miss
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks
- MacOS DigitStealer malware poses as DynamicLake, targets Apple Silicon M2/M3 devices
- Is your password manager truly GDPR compliant?
- 7-Zip vulnerability is being actively exploited, NHS England warns (CVE-2025-11001)