Improved Simplocker variant hits Android users hard

Mobile crypto-ransomware Simplocker has evolved, and returning the encrypted files to their unencrypted state is no longer easy as it was.

RSA Conference 2015: Showcasing the future of information security

Linda Gray, General Manager of RSA Conferences, talks about the growth of RSA Conference, outlines the threats that helped shape this year's agenda, and highlights sessions, speakers and trainings.

Tens of thousands MongoDB databases easily accessible from the Internet

MongoDB is a popular cross-platform, document-oriented NoSQL database, and is used by many major websites and services, including Craigslist, eBay, SourceForge, and many others.

Researcher publishes 10 million usernames and passwords to aid future research

Independent IT security analyst Mark Burnett has released a cleaned up cache of 10 million username and password combinations.

INTERPOL and the fast-paced digital threat landscape

In this interview we learn about the key developments that allow law enforcement to stay on top the fast-paced digital threat landscape, and much more.

Spotlight

Attackers can bypass Windows' protections by changing a single bit

Among the many vulnerabilities that Microsoft patched on Tuesday is one that can be exploited to bypass all Windows security measures by, curiously enough, modifying a single bit of the Windows operating system.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Feb 13th
Events
RSA Conference 2015
20 April - 24 April 2015.
INTERPOL World 2015
14 April - 16 April 2015.

Editor's choice

A closer look at LepideAuditor Suite

LepideAuditor Suite is a solution for auditing multiple server instances. Its centralized platform delivers a single console for configuration change auditing of Active Directory, Group Policy Objects, Exchange Server, SharePoint Server, and SQL Server.

Are organizations ready for the embedded computing takeover?

Today, organizations must weigh the advantages and pitfalls of the technologies they employ in a global environment, where everyone is connected to the Internet.

Kill Chain 3.0: Update the cyber kill chain for better defense

This article proposes three simple steps to make the kill chain even better.

Microsoft fixes critical remotely exploitable Windows root-level design bug

The vulnerability could allow remote code execution if an attacker convinces a user with a domain-configured system to connect to an attacker-controlled network.

Which kind of security professional are you?

What does your inner voice say? Which kind of a professional are you? Are you arrogant, haughty and superior? Or humble, modest and respectful?

Who are the role models in cyberspace?

Who do our kids aspire to be in their digital lives?

How GitHub is redefining software development

The security industry is slowly realizing what the developer community knew for years - collaboration is the key to and likely the future of innovation.


    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //