![match fire](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195631/matchstick-20237_1920-400x200.jpg)
Critical ScreenOS bugs allow undetectable decryption of VPN connections, device hijacking
Juniper Networks has discovered and patched a critical, high-impact vulnerability affecting ScreenOS on its NetScreen devices, and is advising customers to update their …
Washington state sues iYogi tech support firm for scamming users
Washington State Attorney General Bob Ferguson announced a lawsuit against one of the biggest independent tech support providers in the world, iYogi, and its President, Vishal …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195633/encryption1-400x200.jpg)
Human error reduces security offered by encryption apps
Crypto phones – whether they are hardware devices or mobile apps – are a great way to assure that your VoIP communications remain private, but the security and …
![Binary](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195635/binary-sun-400x200.jpg)
Infosec pros are moving beyond traditional passwords
Businesses nationwide are increasing their cybersecurity budgets and exploring alternative authentication techniques to passwords, according to a SecureAuth and Wakefield …
![Healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195637/twitter-verizon2-400x200.jpg)
Stolen medical information affects 18 out of 20 industries
Stolen medical information is a much more widespread issue than previously thought, affecting 18 out of 20 industries examined, according to the just released Verizon 2015 …
![Euro](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195640/twitter-malware1-400x200.jpg)
Mobile banking threats among the leading malicious financial programs
For the first time ever, mobile financial threats rank among the top ten malicious programs designed to steal money. Another alarming trend is the rapid spread of ransomware, …
![binary](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195642/binary-208216_1280-400x200.jpg)
Five key cybersecurity trends for 2016
The overwhelming shift to mobile and cloud computing among both businesses and consumers will see some surprising additions to the risk landscape in 2016. ISACA shares five …
![EU flag](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195648/EU-flag-400x200.jpg)
New EU rules on data protection put the citizen back in the driving seat
New EU data protection legislation, informally agreed on Tuesday and backed by Civil Liberties MEPs on Thursday morning, will create a uniform set of rules across the EU fit …
![Tux](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195651/linux_tux_penguins_1600x1200_w_1920x1200_-400x200.jpg)
Linux machines can be “owned” by hitting backspace 28 times
Taking over a Linux machine that has been locked with a password can be as easy as pressing the backspace key 28 times, two researchers from the Cyber Security Research Group …
![Bug](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195653/software-762486_1280-400x200.jpg)
XSS, SQLi bugs found in several Network Management Systems
Network Management System (NMS) offerings by Spiceworks, Ipswitch, Opsview and Castle Rock Computing have been found sporting several cross-site scripting and SQL injection …
![Abstract](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195656/twitter-research2-400x200.jpg)
Vision for a new generation of experimental cybersecurity research
How do cybersecurity experts discover how to properly defend a system or build a network that’s secure? As in other domains of science, this process involves hypothesis, …
![Laptop](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195658/analytics-925379_1280-400x200.jpg)
IT teams expect a nightmare during the holidays
Dealing with potential data loss will be the number one headache confronting IT professionals in the run up to the 2015 holiday season. Over one-third of IT professionals in …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days