Personal info of 1.1M customers stolen in CareFirst breach

CareFirst, a Blue Cross Blue Shield plan, have suffered a breach in which the attackers gained access to one of their databases.

DDoS attacks double, old web application attack vectors still active

Akamai Technologies analyzed thousands of DDoS attacks as well as nearly millions of web application attack triggers across the Akamai Edge network.

Trojanized, info-stealing PuTTY version lurking online

A malicious version of the popular open source SSH client PuTTY has been spotted.

New UK law says GCHQ agents cannot be prosecuted for hacking

A new legislation exempts intelligence services' employees from being prosecuted for hacking.

European Internet users urged to protect themselves against Facebook tracking

The Belgian Privacy Commission has issued a set of recommendations for both Facebook, website owners and end users.

Spotlight

Keeping passwords safe from cracking

A group of researchers from Purdue University in Indiana have come up with an effective and easy-to-implement solution for protecting passwords from attackers.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, May 22nd
Events
HITBSecConf2015 Amsterdam
26 May - 29 May 2015.
Black Hat USA 2015
01 August - 06 August 2015.

Editor's choice

Companies stay vulnerable to web attacks for far too long

While no true security best practices exist, the key is in identifying the security metrics that mean the most to the organization and focusing on those activities to remediate specific vulnerabilities.

DDoS attacks double, old web application attack vectors still active

Akamai Technologies analyzed thousands of DDoS attacks as well as nearly millions of web application attack triggers across the Akamai Edge network.

Trojanized, info-stealing PuTTY version lurking online

A malicious version of the popular open source SSH client PuTTY has been spotted and analyzed by Symantec researchers, and found to have information-stealing capabilities.

Thereís no security without trust

Trust. Itís a small word but it conveys a lot. To many it is the cornerstone of security, because without trust there can be no security.


    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //