0-day flaw in Seagate NAS devices endangers thousands

Seagate's Business Storage 2-Bay NAS line of products sports a zero-day remote code execution vulnerability that can be easily exploited by attackers.

Critical vulnerabilities affecting SAP business critical apps

High risk vulnerabilities could be used by cyber attackers to gain access to mission-critical information.

The business and social impacts of cyber security issues

With multiple recent high profile attacks targeting household names and large employers, individuals increasingly fear cyber crime and its resulting consequences at work as well as at home.

New DDoS attack and tools use Google Maps plugin as proxy

Attackers are using Joomla servers with a vulnerable Google Maps plugin installed as a platform for launching DDoS attacks.

Spotlight

Black hole routing: Not a silver bullet for DDoS protection

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Mar 2nd
Events
RSA Conference 2015
20 April - 24 April 2015.
INTERPOL World 2015
14 April - 16 April 2015.
HITBSecConf2015 Amsterdam
26 May - 29 May 2015.

Editor's choice

(IN)SECURE Magazine issue 45 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics.

Uber's on a hunt for the attacker that compromised its drivers' database

Late last week, Uber's Managing Counsel of Data Privacy Katherine Tassi has revealed that the company has suffered a data breach.

Critical vulnerabilities affecting SAP business critical apps

High risk vulnerabilities could be used by cyber attackers to gain access to mission-critical information.

Medical identity theft affected two million victims in 2014

The number of patients affected by medical identity theft increased nearly 22 percent in the last year, an increase of nearly half a million victims since 2013.

Cisco, Apple, Citrix products no longer welcome on Chinese government systems

A slew of US tech companies have been dropped from China's Ministry of Finance's approved government procurement list, including Apple, McAfee, Citrix Systems and Cisco Systems.

Over a million WP sites at risk of hijacking due to plugin bug

WordPress users who are also running the WP-Slimstat web analytics plugin should update as soon as possible.


    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //