![mitmproxy](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194352/mitmproxy-http2-a-400x200.png)
Intercept, inspect and modify traffic flow with mitmproxy
mitmproxy is an interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed. All flows are kept in memory, which means that it’s …
![RSA Conference expo](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194400/rsaconference-expo-400x200.jpg)
Cyber Risk Board Forum to take place during RSA Conference 2016
RSA Conference has teamed up with NYSE Governance Services to host the Cyber Risk Board Forum. Set to take place February 29, 2016, in San Francisco, in conjunction with the …
![Magento](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194919/magento-400x200.jpg)
Year-old critical Magento flaw still exploited, payment info stolen
A whole year has passed since a critical e-shop hijacking flaw in the Magento CMS has been patched, but the vulnerability is still being exploited in attacks in the wild, …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
Video: Trust in the Cloud panel
Here is video recording of a “Trust in the Cloud” panel which was a part of the Rackspace::Solve NYC event held last Thursday. Rackspace Security leader David …
![Building](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194404/corporate9-400x200.jpg)
Smart buildings security: Who’s in charge?
As the Internet of Things became an accepted reality, and the security community realized that they have to get involved in securing it, days without news about the insecurity …
![phone](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194408/phone-400x200.jpg)
VoIP phones can be turned into spying or money-making tools
A security vulnerability present in many enterprise-grade VoIP phones can easily be exploited by hackers to spy on employees and management, says security consultant Paul …
![Kotlin](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194407/kotlin-400x200.png)
Kotlin programming language for JVM and Android reaches version 1.0
Kotlin is an open source programming language for JVM and Android that combines OO and functional features and is focused on interoperability, safety, clarity and tooling …
UK security tribunal decides GCHQ’s hacking is legal
The UK GCHQ intelligence agency’s hacking of computers, mobile devices, smart devices, and computer networks has been ruled to be legal, no matter where it happens in …
![Hollywood Presbyterian Medical Center](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194412/Hollywood_Presbyterian_Medical_Center-400x200.jpg)
Hollywood hospital’s systems held hostage by hackers
The Hollywood Presbyterian Medical Center, an “acute-care facility” located in Los Angeles, has had its computer systems compromised by hackers. The attackers are …
![prpl Foundation guide](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194414/prpl-guide-400x200.png)
Security guidance for the Internet of Things
Embedded systems and connected devices are already deeply woven into the fabric of our lives, and the footprint is expanding at a staggering rate. Gartner estimates that 4.9 …
![Police](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195250/police-400x200.jpg)
Teenage admin of anonymous XMPP service arrested in connection to fake bomb threats
The teenage administrator of the Darkness.su XMPP service has been arrested last Monday by the French police, in connection to the wave of false bomb threats that were made …
![Abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194417/abstract-dark-400x200.png)
Anonymous networks 101: Into the heart of the Darknet
Here’s a riddle: What’s hidden in plain sight Stretches the entire known world Vilified and Adored Born from a secret US Government project Maintains secret societies Requires …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark