![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110724/iot-400x200.jpg)
Leaked: Source code for Mirai IoT DDoS botnet
IoT-powered DDoS attacks are on the rise, and the situation is poised to become even worse now that the source code for the Mirai malware has been made public. Reporter Brian …
![nmap](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110432/nmap-400x200.jpg)
Nmap 7.30: New NSE scripts, Npcap, fingerprints
Nmap 7.30 is the first stable release since 7.12 back in March. Apart from bug fixes, it comes with new features, including more NSE scripts, an improved version of Npcap …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112242/abstract-400x200.jpg)
Digital disruptors demand a new approach to IT
Digital disruptors such as algorithms, artificial intelligence (AI), bots and chatbots are already transforming businesses. Gartner expects that algorithmic business will …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110607/networked-world-400x200.jpg)
IEEE 802.3bz standard brings 2.5 and 5 Gb/s to existing cabling
The Ethernet Alliance hailed ratification of IEEE 802.3bz, Standard for Ethernet Amendment: Media Access Control Parameters, Physical Layers and Management Parameters for 2.5 …
![world in hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194240/world-hand-400x200.jpg)
Week in review: Securing ICS, and the reasons behind risky password practices
Here’s an overview of some of last week’s most interesting news and articles: Yahoo breach was not state-sponsored, researchers claim The massive 2014 Yahoo breach …
![mask](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112954/mask-400x200.jpg)
DefecTor: DNS-enhanced correlation attacks against Tor users
A group of researchers from Princeton University, Karlstad University and KTH Royal Institute of Technology have devised two new correlation attacks that can be leveraged to …
![Arduino ESLOV IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110438/arduino-eslov-iot-400x200.jpg)
Arduino’s new open source kit makes creating IoT devices easy
The Arduino team is using Kickstarter to crowdfund their latest project: the ESLOV IoT Invention Kit. ESLOV is a system of intelligent modules that can be connected in an …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112909/user-400x200.jpg)
1 in 3 organizations have experienced an insider attack in the last year
A new Bitglass report on insider threats in the enterprise found that, in a third of organizations surveyed, careless or malicious user behavior resulted in data leakage, up …
![server](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113257/server-400x200.jpg)
Security appliance market shows positive growth
The total security appliance market showed positive year-over-year growth in both vendor revenue and unit shipments for the second quarter of 2016, according to IDC. Worldwide …
![cloud computing](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113632/cloud_computing-400x200.png)
Boardroom perspectives on cloud implementation
Although there’s a significant uptick in cloud adoption at the enterprise level, companies are missing the full benefit of their cloud adoptions by not factoring their IT …
![Yahoo](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110440/yahoo-400x200.jpg)
Yahoo breach was not state-sponsored, researchers claim
The massive 2014 Yahoo breach isn’t the work of state-sponsored hackers as the company has claimed to believe, say researchers from identity protection and threat …
![D-Link DWR-932](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110443/dlink-dwr-932-400x200.jpg)
D-Link DWR-932 router is chock-full of security holes
Security researcher Pierre Kim has unearthed a bucketload of vulnerabilities affecting the LTE router/portable wireless hotspot D-Link DWR-932. Among these are backdoor …
Featured news
Sponsored
Don't miss
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner
- Breaking down FCC’s proposal to strengthen BGP security