![Pwnie Express](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111336/pwnie_express-400x200.jpg)
Pwnie Express open sources IoT and Bluetooth security tools
Pwnie Express announced the availability of open sourced versions of its Blue Hydra and Android build system software. The release of these tools enable comprehensive …
![IOActive](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111259/ioactive-400x200.jpg)
IOActive offers offensive security approach to risk assessment
IOActive launched its Advisory Services practice, offering strategic security consulting that leverages IOActive’s testing and research expertise to help customers …
![Flashpoint dark web](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194258/flashpoint-darkweb-400x200.jpg)
Investigating the supply on 17 underground hacker markets
Have you ever wondered what kind of malicious offerings can be found on dark web “hacker markets,” who sells them and how widely they are available? Three …
![HTML Source Code Viewer](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111302/html_source_code_viewer-400x200.jpg)
Media-stealing Android app targets developers
Symantec researchers have unearthed another app on Google Play that secretly steals photos and videos from victims’ mobile devices. But the curious thing is that it’s …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111304/android-400x200.jpg)
How Google protects the Android kernel, and future plans
On Wednesday, Jeff Vander Stoep of Google’s Android Security team took to the official Android Developers blog and shared some information about the defenses they have …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195211/business-400x200.jpg)
Cybersecurity talent crisis continues, technical skills in high demand
Intel Security, in partnership with the Center for Strategic and International Studies (CSIS), has released a global report outlining the talent shortage crisis impacting the …
![Infection Monkey](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111329/infection_monkey-400x200.jpg)
Infection Monkey: Test a network from an attacker’s point of view
Infection Monkey, a tool designed to test the resiliency of modern data centers against cyber attacks, was developed as an open source tool by GuardiCore’s research …
![magnify look search](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111342/magnify-400x200.jpg)
Global network shares phishing attack intelligence in real-time
IRONSCALES, a multi-layered phishing mitigation solution that combines human intelligence with machine learning, today announced the launch of Federation, a product that will …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111327/usa-400x200.jpg)
Obama defines how the US government will respond to cyber incidents
US president Barack Obama approved on Tuesday the Presidential Policy Directive on United States Cyber Incident Coordination (PPD-41). What’s the PPD-41 all about? …
![Osram Lightify](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111313/osram_lightify-400x200.jpg)
Osram’s intelligent home lighting system is riddled with flaws
“Intelligent” home lighting system Osram Lightify sports a number of security vulnerabilities, some of which could lead to compromise of the product and the …
![LastPass](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111322/lastpass-400x200.jpg)
LastPass zero-day can lead to account compromise
A zero-day flaw in the popular password manager LastPass can be triggered by users visiting a malicious site, allowing attackers to compromise the users’s account and …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112155/skull-400x200.jpg)
Sophisticated ransomware: New tactics to maximize profit
Organizations are unprepared for future strains of more sophisticated ransomware, according to the Cisco 2016 Midyear Cybersecurity Report. Fragile infrastructure, poor …