![samsung camera](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105331/samsung-camera-400x200.jpg)
Samsung SmartCam can be easily hijacked
At least one type of Samsung SmartCam cameras can be taken over by remote attackers who just need to know the vulnerable camera’s IP address. The remote code execution …
![WhatsApp](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105336/whatsapp-400x200.png)
UK users bombarded with scammy offers via Facebook, WhatsApp
Since the beginning of the year, survey scammers have mounted a veritable onslaught against Facebook and WhatsApp users from the UK. The lure comes in the form of a fake free …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110906/car-green-400x200.jpg)
Open source cybersecurity framework for the automotive industry
A consortium of researchers announced the development of a universal, free, and open source framework to protect wireless software updates in vehicles. The team issued a …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105947/architecture-400x200.jpg)
Majority of SOCs are below optimal maturity levels
With increased pressure to rapidly innovate and align security initiatives with business goals, a SOC provides the foundation for how organizations protect their most …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112443/hand-400x200.jpg)
82% of executives experienced a fraud incident in the past year
Fraud, cyber, and security incidents are now the “new normal” for companies across the world, according to the executives surveyed for a new Kroll report. The …
![Head](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195332/head-400x200.jpg)
What resellers think about threats to customers
A new survey, designed to capture the reseller’s perspective on customer cyber threat concerns and their overall understanding of the firewall market, examined the views …
![smartphone](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105531/smartphone-400x200.jpg)
Organizations to gradually replace physical access cards with smartphones
In 2016, less than 5 percent of organizations used smartphones to enable access to offices and other premises. By 2020, Gartner said that 20 percent of organizations will use …
![RSA Conference Innovation Sandbox](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194750/rsac-innovation_sandbox-400x200.jpg)
RSA Conference Innovation Sandbox Contest 2017 finalists announced
RSA Conference announced the 10 finalists for its annual Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of …
![fingerprint](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113609/fingerprint-400x200.jpg)
Accurate cross-browser fingerprinting is possible, researchers show
A group of researchers have come up with a browser fingerprinting technique that can allow interested parties to “identify” users across different browsers (on the …
![magnifying glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195300/magnifying-glass-400x200.png)
Security audit of Dovecot mailserver reveals good security practices
Dovecot – a popular open source IMAP and POP3 server for Linux/UNIX-like systems – is as secure as its developers claim it is. A security audit performed by German …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105506/keys-400x200.jpg)
Key Transparency: A secure directory of public encryption keys
Google has released Key Transparency, an open source public directory meant to simplify the discovery of intended recipients’ public encryption key. The project is still …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105342/patch-400x200.jpg)
Patch and security management take 8 hours per month for most companies
Shavlik and AppSense used VMworld Europe 2016 to collect data from frontline experts, and to highlight patch management and security concerns in corporations. A total of 178 …
Featured news
Sponsored
Don't miss
- Ransomware gang targets IT workers with new RAT masquerading as IP scanner
- Researchers unearth MotW bypass technique used by threat actors for years
- ITSM concerns when integrating new AI services
- Scaling data security solutions: What you need to know
- Whitepaper: Tools to tackle the multicloud environment