![Berlin](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110709/berlin-germany-400x200.jpg)
German Federal Intelligence Service violates laws, dodges supervision
The German Federal Intelligence Service (BND) has been illegally collecting data through mass surveillance tools, storing it in databases that should not exist, and has …
![labyrinth](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194928/labyrinth-400x200.jpg)
Top network security and data privacy concerns among businesses
With network security top of mind, businesses are nearly two times more concerned with losing private data (47 percent) than hackers disrupting their systems (26 percent), …
![MicroFocus](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110712/microfocus-400x200.jpg)
Micro Focus merger with HPE’s Software Business Segment worth $8.8 billion
Micro Focus announced today its intent to merge with HPE’s Software Business Segment in a transaction valued at approximately $8.8 billion. The merger is subject to …
![WordPress](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110714/wordpress-400x200.jpg)
WordPress 4.6.1 upgrades security, fixes 15 bugs
WordPress 4.6.1 is now available. This is a security release for all previous versions and all users are strongly encouraged to update their sites immediately. The two …
![Yelp](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110717/yelp-400x200.jpg)
Yelp makes its bug bounty program public
After two years of keeping their bug bounty program private and relatively secret, Yelp is opening it up and has invited bug hunters to probe its sites, apps, and …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110724/iot-400x200.jpg)
Mirai Linux Trojan corrals IoT devices into DDoS botnets
Mirai, a newly discovered and still poorly detected piece of Linux malware, is being used to rope IoT devices into DDoS botnets. Researchers from MalwareMustDie have recently …
![trojan](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110846/trojan-400x200.jpg)
Gugi banking Trojan outsmarts Android 6 security
A modification of the Gugi banking Trojan that can bypass Android 6 security features designed to block phishing and ransomware attacks. The modified Trojan forces users into …
![Lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114021/lock-400x200.jpg)
ISPs treat cyber security as a top priority
Better law enforcement training and coordination of cyber security and support for a government-backed awareness campaign are two key findings of an ISP survey by the Internet …
![authentication](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113517/authentication-400x200.jpg)
Iovation acquires LaunchKey, shows the future of authentication
Iovation, a provider of device-based solutions for authentication and fraud prevention, announced the acquisition of multifactor authentication company LaunchKey. The move …
![Brazzers](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110728/brazzers-400x200.jpg)
Nearly 800,000 Brazzers users’ credentials exposed
Account login credentials of nearly 800,000 Brazzers porn site users have been stolen in 2012, but the breach has only now come to light, after the data dump was obtained by …
![Cisco ASA](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110733/cisco_asa-400x200.jpg)
Too many Cisco ASA boxes still open to an EXTRABACON attack
Among the Equation Group exploits leaked by the Shadow Brokers, the one named EXTRABACON that targets Cisco ASA devices got the most attention from security researchers and …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195208/password-400x200.jpg)
Rambler.ru hack: Passwords of nearly 100 million users exposed
A new data leak – confirmed to be legitimate by LeakedSource and added to its searchable online database – affects nearly 100 million users of Rambler.ru, one of …
Featured news
Sponsored
Don't miss
- CrowdStrike engages external experts, details causes of massive outage
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner