China executes MITM attack against iCloud and Microsoft account holders

Posted on 20 October 2014.  |  China-based Internet users are in danger of getting their iCloud and Windows Live accounts hijacked.

Beware of Ebola-themed phishing, malware campaigns and hoaxes

Posted on 17 October 2014.  |  US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme.

Easily exploitable Drupal bug can lead to total site compromise

Posted on 16 October 2014.  |  Admins of sites that run Drupal 7 are advised to update to the latest version of the platform because it fixes a critical vulnerability.

4 million UPnP devices may be vulnerable to attack

Posted on 15 October 2014.  |  Akamai has observed the use of a new reflection and amplification DDoS attack that deliberately misuses communications protocols that come enabled on millions of home and office devices.

Lessons learned developing Lynis, an open source security auditing tool

Posted on 15 October 2014.  |  Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening.

Spotlight

Targeted attack protection via network topology alteration

Posted on 17 October 2014.  |  This article from Trend Micro tackles how network topology can aid in defending the enterprise network from risks posed by targeted attacks.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Oct 20th
Events
McAfee FOCUS 14
27 October - 29 October 2014.
INTERPOL World 2015
14 April - 16 April 2015.

Editor's choice

The Software Assurance Marketplace: A response to a challenging problem

20 October 2014. | The DHS Science and Technology Directorate has recognized how critical the state of software security is to the DHS mission.

Beware of Ebola-themed phishing, malware campaigns and hoaxes

17 October 2014. | US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme.

Tips for mitigating the financial impact of identity theft

16 October 2014. | Here are some practical tips on how consumers can better prepare for the likelihood of having their identity stolen.

Developing Lynis, an open source security auditing tool

15 October 2014. | Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening.

Detecting cyber attacks in a mobile and BYOD organization

14 October 2014. | Many organizations understand that traditional perimeter security defenses are not effective at identifying attacks on mobile devices.

Identifying deceptive behavior in user-generated content

13 October 2014. | JT Buser, Manager of Authenticity and Fraud at Bazaarvoice, talks about challenges involved in identifying deceptive behavior in user-generated content and interesting techniques he's seen scammers use.


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //