![embedded](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114045/embedded-400x200.jpg)
Can poorly designed embedded devices kill?
The industry is not taking safety and security seriously enough, according to the Barr Group, who conducted a survey to better understand the state of safety- and …
![Porn clicker](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114048/pornclicker-400x200.jpg)
Porn Clicker Android malware hits Google Play hard
In a little over seven months, cybercriminals using click-jacking mobile malware to earn affiliate income have managed to push over 340 instances of the malware into Google …
![cyber microscope](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114052/cyber_microscope-400x200.jpg)
Cyber microscope enables advanced security anomaly detection
Lewis Rhodes Labs introduced the Cyber Microscope for faster and more accurate anomaly detection. The new product is based upon a Cyber Optimized Neuromorphic Processor that …
![Phantom](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194141/phantom-logo-400x200.png)
Phantom: Security automation and orchestration platform
The Phantom platform can integrate existing security technologies and provide a layer of “connective tissue” between otherwise disparate systems. Phantom was …
![Magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194145/magnify-400x200.jpg)
DB Networks partners with Cyphort and Security On-Demand
Big news from DB Networks, a provider of database cybersecurity products. They partnered with Cyphort to offer customers full spectrum visibility from the desktop and network …
![Ping Identity](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114050/pingidentity-400x200.jpg)
Ping Identity enhances its Federated Access Management technology
Ping Identity updated its Federated Access Management technology. Designed to displace legacy Identity and Access Management infrastructures, this latest release includes …
![Google](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194147/google-400x200.png)
Google offers free DDoS protection to independent news sites
Google (i.e., Alphabet) has created a free DDoS protection service to help independent news sites, sites focused on human rights and on election monitoring withstand DDoS …
![Circle eye](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194150/circle3-400x200.jpg)
FBI subpoenaed Carnegie Mellon University for Tor-using suspect’s IP address
A court order in the case of U.S. vs Brian Farrell, a man charged with conspiracy to distribute illegal drugs while he was allegedly an administrator of the Silk Road 2.0 …
![Match](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194152/fire-match-400x200.jpg)
Not all data breaches are created equal
1,673 data breaches led to 707 million data records being compromised worldwide during 2015, according to Gemalto’s Breach Level Index (BLI). The BLI is a global …
![Nissan LEAF](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194200/Nissan-Leaf-400x200.jpg)
Insecure APIs allow anyone to mess with Nissan LEAF electric car
A vulnerability in the mobile app used to interact with Nissan LEAF, a popular electric car, can be exploited by remote, unauthenticated attackers to switch the car’s AC …
![keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194155/keyboard-400x200.jpg)
A third of IT managers admit to hacking
A high percentage of IT personnel admitted to not following the same security protocols they are expected to enforce, according to Absolute Software. Of those surveyed, 33% of …
![Binary](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195635/binary-sun-400x200.jpg)
Internet of Evil Things: The growing risks of connected devices
As risk and concern around connected Internet of Things (IoT) devices continues to grow, resources and visibility into such connected devices have stagnated despite the …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark