![router](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100046/router-400x200.jpg)
Most popular home routers lack basic software security features
It’s no secret that too many Internet of Things devices lack adequate security. But is it too much to expect that out home routers – the devices that …
![door](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105503/door-400x200.jpg)
Old and new OpenSSH backdoors threaten Linux servers
OpenSSH, a suite of networking software that allows secure communications over an unsecured network, is the most common tool for system administrators to manage rented Linux …
![The Linux Foundation](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100123/linux_foundation-400x200.jpg)
Are communications service providers confident in open source networking solutions?
The Linux Foundation announced the results of an industry survey to gauge industry perceptions of open source across networking technologies. Top takeaways from the survey …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112340/lock-400x200.jpg)
French cybersecurity agency open sources security hardened CLIP OS
After developing it internally for over 10 years, the National Cybersecurity Agency of France (ANSSI) has decided to open source CLIP OS, a Linux-based operating system …
![circle](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100231/circle-400x200.jpg)
Cybersecurity as catalyst for greater adoption of agile development
Agile development increases the output of software development projects by using a faster, more iterative engineering process. This pace also allows rapid course correction, …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110910/biohazard-400x200.jpg)
Cryptocurrency miners poised for continued growth
WatchGuard threat intelligence from Q1 2018 revealed that 98.8 percent of seemingly common Linux/Downloader malware variants were actually designed to deliver a popular …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102007/cisco-400x200.jpg)
Cisco fixes critical flaw in its Secure Access Control System
Cisco has pushed out fixes for security vulnerabilities in a wide variety of its products, including two critical flaws in its Secure Access Control System (ACS) and its Prime …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102325/iot-400x200.jpg)
IoT malware targeting zero-day vulnerabilities
Once it became evident that IoT devices can be relatively easily enslaved in botnets and that even their limited power can be used for a variety of nefarious purposes, it was …
![botnet](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112808/botnet-jaku-400x200.jpg)
PyCryptoMiner ropes Linux machines into Monero-mining botnet
A Linux-based botnet that has been flying under the radar has earned its master at least 158 Monero (currently valued around $63,000). The malware The botnet is based on a …
![meltdown](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102251/meltdown-400x200.jpg)
Meltdown and Spectre: Data theft hardware bugs affect most modern CPUs
In the wake of yesterday’s news and speculation about a serious design flaw in Intel processors, the security researchers involved in discovering the issue and the …
![Intel inside](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102256/intel_inside-400x200.jpg)
Upcoming patches for security flaw in Intel processors expected to slow down computers
Windows users whose PCs run on Intel processors can apparently expect their computers to slow down after next Tuesday. In fact, all computers using modern Intel chips – …
![Internet](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102433/internet-400x200.jpg)
Are your connected devices searchable on the Internet?
Despite being a hub for technology talent, Berliners are leaving themselves wide open to cyberattack through poor security practices that are exposing millions of cyber …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)