![code](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194237/code-400x200.jpg)
Flawed code hooking engines open endpoints to compromise
Six common security issues stemming from the incorrect implementation of code hooking and injection techniques have been unearthed by EnSilo researchers in over 15 different …
![httpoxy](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111433/httpoxy-400x200.jpg)
Widespread httpoxy vulnerabilities affect server-side web apps
A new, branded set of vulnerabilities has been revealed by security researchers, this time responsibly and without too much fanfare. The collective name given to the …
![alpha CrypTech](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111436/alpha-CrypTech-featured-400x200.jpg)
Open source hardware cryptographic module offered for $800
For a few years now, the CrypTech project has been working on designing an open source hardware cryptographic engine that could be used to secure core Internet infrastructure. …
![earth](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111449/earthspace-400x200.jpg)
Cyber resilience: Securing global infrastructures
It seems like every part of the human experience is touched by technology in some way. In many respects, it makes our lives safer, our communication easier, and creates …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112935/ddos-400x200.jpg)
DDoS attacks continue to escalate in both size and frequency
Arbor Networks released global DDoS attack data for the first six months of 2016 that shows a continuing escalation in the both the size and frequency of attacks. …
![Search](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112405/search-threat-400x200.jpg)
Most CISOs and CIOs need better resources to mitigate threats
Despite acute awareness of the millions of dollars in annual costs, and the business risks posed by external internet threats, security leaders highlight the lack of staff …
![dollar](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112427/dollar-400x200.jpg)
How to steal money from Instagram, Google and Microsoft
Some account options deployed by Instagram, Google and Microsoft can be misused to steal money from the companies by making them place phone calls to premium rate numbers, …
![Pokemon GO](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111452/pokemongo-1-400x200.jpg)
Have you read Pokémon GO’s Terms of Service? You might want to
As Pokémon GO becomes available in more and more countries, and is enthusiastically embraced by an increasingly larger number of users, we’re witnessing a wide array of …
![DARPA Cyber Grand Challenge](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111456/cyber_grand_challenge-400x200.jpg)
First all-machine hacking tournament coming to Las Vegas
Long-lived critical flaws in widely deployed bedrock internet infrastructure are not rare. Analysts have estimated that, on average, such flaws go unremediated for 10 months …
![Joomla!](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111459/joomla-400x200.jpg)
Compromised Joomla sites are foisting ransomware on visitors
Administrators of WP and Joomla sites would do well to check for specific fake analytics code injected into their properties, as a ransomware delivery campaign taking …
![Ubuntu](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113028/ubuntu-400x200.jpg)
Ubuntu Forums hacked again, 2 million users exposed
Canonical’s Ubuntu Forums have been hacked, and the attacker has managed to access and download part of the Forums database, containing usernames, email addresses and …
![download](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112034/download-400x200.jpg)
Demand for cloud data encryption creates CASB market growth
The global cloud access security brokers market will expand at a CAGR of 16.7% during the period between 2016 and 2024, according to a new report by Transparency Market …