Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
target
SMEs under attack, security readiness still low

When it comes to securing their data, SMEs remain several steps behind their larger counterparts. Some reasons for the disparity in security readiness may be that SMEs have …

samas-ransomware
Samas ransomware enters hospitals through vulnerable servers

There’s hardly a day anymore that we don’t hear about a hospital being hit with ransomware. But while most have been infected via phishing emails carrying or …

iPhone
SideStepper vulnerability can be used to install malicious apps on iOS

Check Point researchers have identified SideStepper, a vulnerability that can be used to install malicious apps on iPhones and iPads to steal login credentials and sensitive …

Law legislation
Hackers breaching law firms for insider trading info

Two of the most prestigious law firms in the US, best known for their financial services and corporate practices, have had their computer networks compromised by hackers. …

Money
Consumers living in smart homes are willing to sell personal data

A majority of respondents worldwide might be willing to share their personal data collected from their smart home with companies in exchange for money, and 70 percent agree …

linux tux
Linux security isn’t enough to stop data breaches

There is a difference between the security of an operating system and the security of the data created, which is edited and manipulated by people and saved on the operating …

credit cards secure
NIST security standard to protect credit cards, health information

For many years, when you swiped your credit card, your number would be stored on the card reader, making encryption difficult to implement. Now, after nearly a decade of …

Steam
Student bypasses Valve’s review process, publishes game on Steam

Sometimes the only way to get an organization to listen to you when it comes to existing vulnerabilities in their products is to exploit them yourself and make the proof of …

Pyxis SupplyStation system
1,400+ vulnerabilities found in automated medical supply system

Security researchers have discovered 1,418 vulnerabilities in CareFusion’s Pyxis SupplyStation system – automated cabinets used to dispense medical supplies …

AT&T IoT report
Commonly used IoT devices vulnerable to privacy theft

A technical investigation by Bitdefender has discovered that four commonly used Internet of Things (IoT) consumer devices are vulnerable to attack. The analysis reveals that …

payment card
Carders use custom built POS malware to hit US retailers

Crypto-ransomware might be the most prominent type of malware these days, but that doesn’t mean that criminals have stopped using other kinds. According to FireEye …

container security
Container security for enterprise computing

The largest pain-point today for organizations moving to a container strategy is that containers are being adopted and managed by developers. Operations and security do not …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools