Intentional backdoors in iOS devices uncovered

Posted on 22 July 2014.  |  A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.

IT security training: Be proactive

Posted on 22 July 2014.  |  It’s not hard to see in scenarios such as these why people are considered to be the weakest link.

Unpatched OpenSSL holes found on Siemens ICSs

Posted on 21 July 2014.  |  A number of Siemens industrial products have been found sporting four vulnerabilities in their OpenSSL implementation, which could lead to MitM attacks or the crashing of web servers of the products.

EFF invites hackers to test, secure its Open Wireless Router

Posted on 21 July 2014.  |  The EFF has released Open Wireless Router, an experimental alpha release of wireless router software that is meant to improve some and add new capabilities to existing routers.

40% of IT security teams keep executives in the dark

Posted on 18 July 2014.  |  A new survey uncovered the communication challenges between IT security professionals and executives.

Spotlight

Internet Explorer vulnerabilities increase 100%

Posted on 23 July 2014.  |  Bromium Labs research determined that Internet Explorer vulnerabilities have increased more than 100 percent since 2013, surpassing Java and Flash vulnerabilities.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Jul 23rd
Events
Black Hat USA 2014
02 August - 07 August 2014.
PasswordsCon 2014 Las Vegas
05 August - 06 August 2014.
Cyber Security EXPO 2014
08 October - 09 October 2014.

Editor's choice

Internet Explorer vulnerabilities increase 100%

23 July 2014. | Bromium Labs analyzed public vulnerabilities and exploits from the first six months of 2014.

40% of orgs running VMware still susceptible to Heartbleed

23 July 2014. | More than three months have passed since the discovery of the OpenSSL Heartbleed bug, and many systems are still vulnerable.

Intentional backdoors in iOS devices uncovered

22 July 2014. | A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.

Critical de-anonymization 0-days found in Tails

22 July 2014. | Tails, the security-focused Debian-based Linux distribution, sports a number of critical vulnerabilities that can lead to the user's identity to be discovered by attackers.

What does the future hold for cloud computing?

21 July 2014. | Cloud computing’s widespread adoption by businesses and consumers alike all but guarantees that, in five to ten years’ time, the technology will still be very much with us.

Review: Computer Incident Response and Forensics Team Management

21 July 2014. | This book aims to teach how to manage such a team, help you decide when it's the time to had over the investigation to a forensics team, and how to manage that team, as well.


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //