Week in review

Week in review: The new Help Net Security, critical Glibc flaw, new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, reviews and articles: Welcome to the new Help Net Security We rolled out a brand new version of …

Week in review: Dyre gang takedown, and the most popular hacking methods
Here’s an overview of some of last week’s most interesting news and articles: Know your enemy: The most popular hacking methods Outsiders want to become insiders …

Week in review: EU-US Privacy Shield, using AI to build an army of virtual analysts
Here’s an overview of some of last week’s most interesting news and articles: Fake Amazon survey-for-money offer leads to account compromise “As a valued …
Week in review: Rise of automation, Google hacking, and Symantec reseller turns to scamming
Here’s an overview of some of last week’s most interesting news, reviews and articles: “Deliberately hidden” backdoor found on US government’s …
Week in review: The danger of terror attacks using drones, cheap web cams as permanent backdoors into networks
Here’s an overview of some of last week’s most interesting news and articles: Wi-Fi and security are better together for SMBs As a small to midsized business …
Week in review: SLOTH attacks, JavaScript-based ransomware, and hacking medical implants
Here’s an overview of some of last week’s most interesting news and articles: SLOTH attacks weaken secure protocols because they still use MD5 and SHA-1 …
Week in review: ScreenOS backdoor, Twitter warns about state-sponsored attacks, and MacKeeper data breach
Here’s an overview of some of last week’s most interesting news and articles: Critical ScreenOS bugs allow undetectable decryption of VPN connections, device …
Week in review: Information the FBI can collect with NSLs revealed, VPN protocol flaw gives away users’ true IP address
Here’s an overview of some of last week’s most interesting news and articles:Human element of security to the fore at IRISSCON 2015Training people to take more …
Week in review: Dell computers shipped with root CA cert and private key, analytics services tracking users via Chrome extensions
Here’s an overview of some of last week’s most interesting news and articles:Four ways an attacker can infiltrate an organization by diverting security …
Week in review: Mainframe security, cross-device tracking, and how online fraud will evolve in 2016
Here’s an overview of some of last week’s most interesting news, interviews and articles:Android adware tricks users into giving it power to secretly download …
Week in review: Linux ransomware, university researchers unmask Tor users, and how one man changed the way we understand SSL
Here’s an overview of some of last week’s most interesting news and articles:Ivan Ristic and SSL Labs: How one man changed the way we understand SSL“When I …
Week in review: DDoS attack on ProtonMail, 0-days found in Samsung Galaxy S6 Edge
Here’s an overview of some of last week’s most interesting news, interviews and articles:Surviving in the IoT world: Risks of smart home devicesInvestigating some …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility