How Shellshock can be exploited over DHCP
Attacks exploiting the Shellshock vulnerability (actually, vulnerabilities) are popping up daily, but while Shellshock attacks on web apps have been the most documented and …
Information security experts: Act and protect charities online
Immediately after Sir Tim Berners-Lee kicked off IP EXPO and the adjoining Cyber Security EXPO, the stage was given over to Amar Singh CEO of GiveADay and Brian Honan, CEO of …
Privacy breaches in Europe
Half of all the privacy breaches affecting people in Europe are inside jobs according to new research from Central European University. The findings come from a report …
Monitoring tool profiles user behavior to reveal human risk
BalaBit unveiled Blindspotter, an IT security tool that analyzes all user activity, including malicious events, occurring throughout IT systems. Blindspotter features …
Rapid7 releases Nexpose Ultimate
Rapid7 released Nexpose Ultimate, a vulnerability management solution that combines assessment of vulnerabilities and controls, vulnerability validation, and prioritized …
First secure external HDD with cloud management
Imation announced a high-security, high-performance external USB 3.0 SuperSpeed hard drive capable of being managed in the cloud. Using a single centralized, cloud-based …
A walk through Cyber Security EXPO 2014
Co-located with IP EXPO Europe, a cloud and IT infrastructure event, Cyber Security EXPO is taking place this week in London. Help Net Security is at the event, and …
133 DDoS attacks over 100Gbps so far in 2014
Arbor Networks released global DDoS attack data for Q3 2014 showing a remarkable increase in Simple Service Discovery Protocol (SSDP) reflection attacks. Arbor monitored very …
Bugzilla bug that could reveal other software flaws has been patched
A critical security vulnerability in the popular online bug-tracking-and-testing tool Bugzilla has been patched, and users are advised to update to new releases as soon as …
Infected ATMs give away millions of dollars without credit cards
Kaspersky Lab performed a forensic investigation into cybercriminal attacks targeting multiple ATMs around the world. During the course of this investigation, researchers …
Windows 10 will not come with built-in keylogging capabilities
In case you missed it, a big fuss has been raised about the keylogging and other “spying” capabilities of the recently released Technical Preview version of …
How does spam affect your business?
68% of organizations have seen their day-to-day business operations severely disrupted or completely stopped as a result of at least one spam-related incident in the last year …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance