How businesses can stem the flow of leaky data

The privacy and security of corporate data is at risk like never before.

Massive campaign uses router exploit kit to change routers' DNS servers

Well-known security researcher Kafeine has spotted an active campaign aimed at compromising SOHO routers and changing their DNS settings.

15,000 spam emails have hit the inboxes of Android users in recent days

Thousands of Android users are at risk of having their mobile devices and private contents locked by a particularly ruthless ransomware that demands $500 to restore access.

Travel smart: Tips for staying secure on the road

Whether you're taking a personal holiday or a business trip, make sure your security best practices are coming along for the ride.

Android factory reset not enough to keep data secure

If you sell or gift your old Android phone to someone, is it enough to do a factory reset to wipe all your sensitive data?

Spotlight

Whitepaper: 10 things your next firewall must do

For enterprises looking at Next-Generation Firewalls, the most important consideration is: will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, May 29th
Events
HITBSecConf2015 Amsterdam
26 May - 29 May 2015.
Black Hat USA 2015
01 August - 06 August 2015.

Editor's choice

Drone detection: What works and what doesn't

Another drone was discovered flying in restricted air space around the White House. The Secret Service found the pilot simply because they happened to see him. A little drone-detection education is in order.

Reactions to the IRS hack that impacted 100,000 people

Cybercriminals were able to successfully steal tax forms full of personal information of more than 100,000 taxpayers through IRSí Get Transcript application.

Researchers track Android users by collecting accelerator readings

A group of researchers have demonstrated that Android users' movements can be tracked by simply analyzing the data provided by the devices' accelerometers and orientation sensors.

Massive campaign uses router exploit kit to change routers' DNS servers

Well-known security researcher Kafeine has spotted an active campaign aimed at compromising SOHO routers and changing their DNS settings.


    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //