Extracting encryption keys by measuring computers' electric potential

Posted on 22 August 2014.  |  A group of researchers have demonstrated new and unexpected ways to retrieve decryption keys from computers.

Critical Delphi and C++Builder VCL library bug found

Posted on 21 August 2014.  |  A buffer overflow vulnerability that could be exploited to execute malicious code has been discovered.

51 UPS stores hit with PoS malware

Posted on 21 August 2014.  |  UPS Stores, a subsidiary of UPS, has discovered malware on systems at 51 locations in 24 states (about 1%) of 4,470 franchised center locations throughout the United States.

51% of consumers share passwords

Posted on 20 August 2014.  |  Consumers are inadvertently leaving back doors open to attackers as they share log in details and sign up for automatic log on to mobile apps and services.

Breaking the security of physical devices

Posted on 18 August 2014.  |  Silvio Cesare, Director of Anti-Malware Engineering at Qualys, discusses the security measures of a number of household devices and things.

Spotlight

What can we learn from the top 10 biggest data breaches?

Posted on 21 August 2014.  |  Here's a list of the top 10 biggest data breaches of the last five years. It identifies the cause of each breach as well as the resulting financial and reputation damage suffered by each company.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 22nd
Events
Cyber Security EXPO 2014
08 October - 09 October 2014.
McAfee FOCUS 14
27 October - 29 October 2014.

Editor's choice

Securing networks in the Internet of Things era

22 August 2014. | The IoT will probably represent the biggest change to our relationship with the Internet since its inception.

How the role of the CSO is changing

21 August 2014. | Rick Howard, CSO at Palo Alto Networks, talks about the role of the CSO and how it's fundamentally changing.

Most popular Android apps open users to MITM attacks

21 August 2014. | An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact.

Review: iStorage datAshur Personal secure USB flash drive

20 August 2014. | This PIN-activated USB flash drive is designed for everyday use, both private and corporate.

51% of consumers share passwords

20 August 2014. | Consumers are inadvertently leaving back doors open to attackers as they share log in details and sign up for automatic log on to mobile apps and services.

BGP hijacking for cryptocurrency profit

19 August 2014. | Joe Stewart, Director of Malware Research at Dell SecureWorks, talks about his team's discovery of suspicious activity occurring on mining systems.

Breaking the security of physical devices

18 August 2014. | Silvio Cesare, Director of Anti-Malware Engineering at Qualys, discusses the security measures of a number of household devices and things.


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //