![digital pentagon](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113842/twitter-pentagon-400x200.jpg)
Hack the Pentagon: Hackers asked to help secure public-facing systems
The US Department of Defense (DoD) has invited hackers participate in “Hack the Pentagon”, a program aimed at finding vulnerabilities in some of the …
![Building](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194404/corporate9-400x200.jpg)
Weak default credentials, command injection bug found in building operation software
A vulnerability in servers programmed with Schneider Electric’s StruxureWare Building Operation software can be exploited by a low-skilled, remote attacker to gain access to …
![success](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113847/successf-400x200.jpg)
Crypto pioneers Diffie and Hellman win Nobel Prize of Computing
ACM, the Association for Computing Machinery has announced at RSA Conference that it has awarded crypto pioneers Whitfield Diffie and Martin E. Hellman the 2015 ACM A.M. …
![connected](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113848/sophos-400x200.jpg)
Open source risk management tool for Android application packages
Are there any security vulnerabilities in the open source you use? At RSA Conference, WhiteSource announced the release of the industry’s first Android Application Package …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113854/users7-400x200.jpg)
Only one in five orgs set up to securely manage user identities
As organizations seek to capitalize on digital opportunities through rapidly developing and hosting new services online, they frequently under-invest in adequate cybersecurity …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113844/attacks-400x200.jpg)
Repeat DDoS and web application attacks become the norm
Akamai Technologies has shared the latest DDoS and web application attacks numbers in its Q4 2015 State of the Internet report. DDoS attack activity at a glance During Q4, …
![visa spam](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113856/visa-spam-400x200.jpg)
UK, US users hit with credit card-themed spam spreading ransomware
Symantec researchers have spotted an unusual ransomware delivery campaign hitting mostly UK and US users: fake emails apparently coming from Visa are urging recipients to …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113858/abstract-400x200.jpg)
Ten technologies to unlock the full potential of the Internet of Things
Gartner has highlighted the top 10 Internet of Things (IoT) technologies that should be on every organization’s radar through the next two years. “The IoT demands …
![threat quotient](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113900/threatquotient-400x200.jpg)
ThreatQuotient wins Security Start Up of the Year award
ThreatQuotient announced its Threat Intelligence Platform (TIP), ThreatQ, was recognized as a Silver winner for Innovation in Enterprise Security at the 2016 Info Security …
![innovation sandbox](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113902/innovation-sandbox-400x200.jpg)
Photo gallery: RSA Conference 2016 Innovation Sandbox
The RSA Conference 2016 is underway at the Moscone Center in San Francisco. Here are a few photos from the Innovation Sandbox, where the 10 finalists – Bastille …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113904/twitter-hands2-400x200.jpg)
Companies are realizing that security and privacy go hand in hand
50 percent of companies over the past two years have increased the involvement of privacy professionals on their information security teams to enhance the prevention of data …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113905/bluvector-400x200.jpg)
BluVector 2.0: Machine-learning malware detection
At RSA Conference 2016 Acuity Solutions announced the release of version 2.0 of BluVector, its machine-learning malware detection and cyber hunting solution, which now …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark