![Doctor](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195051/doctor-health-400x200.jpg)
Cybersecurity recommendations for medical device manufacturers
Cybersecurity threats to medical devices are a growing concern. The exploitation of cybersecurity vulnerabilities presents a potential risk to the safety and effectiveness of …
![measure](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195055/measure-400x200.jpg)
OpenWPM: An automated, open source framework for measuring web privacy
Among the speakers at the first ever Privacy Con, organized by the US Federal Trade Commission (FTC) and held last Thursday in Washington, DC, was Steven Englehard, a Ph.D. …
![sign](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195057/sign-1-400x200.jpg)
Good practice guide on disclosing vulnerabilities
ENISA published a good practice guide on vulnerability disclosure, aiming to provide a picture of the challenges the security researchers, the vendors and other involved …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195100/money-400x200.jpg)
Worldwide IT spending outlook for 2016
Worldwide IT spending is forecast to total $3.54 trillion dollars in 2016, just a 0.6 percent increase over 2015 spending of $3.52 trillion dollars, according to Gartner, Inc. …
![LastPass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195103/lastpass-icon-300x200.png)
LostPass: A worryingly simple phishing attack aimed at LastPass users
Security researcher (and Praesido CTO) Sean Cassidy has demonstrated at ShmooCon how easy it can be for hackers to steal LastPass users’ email, password, and two-factor …
![justice sentence gavel law court](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112848/justice-400x200.jpg)
Casino operator sues Trustwave for failing to spot and stop hackers
Nevada-based Affinity Gaming, which operates five casinos in that state and 11 altogether in the US, is suing infosec outfit Trustwave, claiming that the company did a poor …
![Internet](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102433/internet-400x200.jpg)
Unexpected implications arising from the Internet of Things
More than half of major new business processes and systems will incorporate some element of the Internet of Things (IoT) by 2020, according to Gartner. The impact of the IoT …
Week in review: The danger of terror attacks using drones, cheap web cams as permanent backdoors into networks
Here’s an overview of some of last week’s most interesting news and articles: Wi-Fi and security are better together for SMBs As a small to midsized business …
![OS X Gatekeeper](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195200/gatekeeper-201x200.png)
OS X’s Gatekeeper bypassed again
Do you remember when, last October, Synack director of research Patrick Wardle found a simple way to evade OS X’s Gatekeeper defense mechanism by bundling up a …
![Hyatt](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195201/hyatt-logo-400x200.jpg)
250 Hyatt hotels around the world hit with PoS malware
In late December, the Hyatt Hotels Corporation announced that they found malware on computers that operate the payment processing systems for Hyatt-managed locations, but …
![Library](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195203/library-400x200.jpg)
Success of the Internet of Things depends on privacy and security
Even as the Internet of Things (IoT) creates new usages, systems and ways to manage and store data, there is a parallel need for impermeable privacy policies and protection …
![OpenSSH](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195206/OpenSSH-400x200.png)
Flaw allows malicious OpenSSH servers to steal users’ private SSH keys
Qualys researchers have discovered two vulnerabilities in the popular OpenSSH implementation of the secure shell protocol, one of which (CVE-2016-0777) could be exploited by …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days