Please turn on your JavaScript for this page to function normally.
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194155/keyboard-400x200.jpg)
Which passwords to avoid for Internet-facing systems?
For the last year or so, Rapid7 has been collecting login credentials via “Heisenberg,” a network of low-interaction honeypots that the company has set up to analyze login …
![Fisher-Price Smart Toy](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194531/smart-toy-400x200.png)
Security flaws discovered in smart toys and kids’ watches
Rapid7 researchers have unearthed serious flaws in two Internet of Things devices: The Fisher-Price Smart Toy, a “stuffed animal” type of toy that can interact …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195208/password-400x200.jpg)
Compromised credentials a leading concern for most security pros
90% of organizations are worried about compromised credentials, though 60% say they cannot catch these types of attacks today, according to a new survey by Rapid7. 62% of …
![Tux](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195651/linux_tux_penguins_1600x1200_w_1920x1200_-400x200.jpg)
Linux machines can be “owned” by hitting backspace 28 times
Taking over a Linux machine that has been locked with a password can be as easy as pressing the backspace key 28 times, two researchers from the Cyber Security Research Group …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD