D-Link routers vulnerable to DNS hijacking

Posted on 29 January 2015.  |  At least one and likely more D-Link routers as well as those of other manufacturers using the same firmware are vulnerable to remote changing of DNS settings and, effectively, traffic hijacking.

Critical BlackPhone bug allows attackers to spy on users

Posted on 28 January 2015.  |  BlackPhone, a mobile phone aimed at users who want to keep their communications secure from mass surveillance attempts, is affected by a critical security vulnerability.

Reactions to the serious vulnerability found in Glibc

Posted on 28 January 2015.  |  A DDoS attack on a company’s online resources might cause considerable losses – with average figures ranging from $52,000 to $444,000 depending on the size of the company.

Why Google won't be updating pre-KitKat WebKit anymore

Posted on 27 January 2015.  |  Google will no longer be providing security patches for WebView used in pre-KitKat (v4.4) Android versions.

How GitHub is redefining software development

Posted on 26 January 2015.  |  The security industry is slowly realizing what the developer community knew for years - collaboration is the key to and likely the future of innovation.

Spotlight

Email scammers stole $215M from businesses in 14 months

Posted on 29 January 2015.  |  In 14 months there have been nearly 1200 US and a little over 900 non-US victims of BEC scams, and the total money loss reached nearly $215 million.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Jan 30th
Events
RSA Conference 2015
20 April - 24 April 2015.
INTERPOL World 2015
14 April - 16 April 2015.

Editor's choice

How much can a DDoS attack cost your organization?

29 January 2015. | A DDoS attack on a company’s online resources might cause considerable losses – with average figures ranging from $52,000 to $444,000 depending on the size of the company.

How important is online privacy?

28 January 2015. | Consumer online privacy concerns remain extremely high with 92 percent of American internet users worrying to some extent about their privacy online.

Reactions to the serious vulnerability found in Glibc

28 January 2015. | The Qualys security research team has found a critical vulnerability in the Linux GNU C Library (glibc), that allows attackers to remotely take control of an entire system without having any prior knowledge of system credentials.

Why Google won't be updating pre-KitKat WebKit anymore

27 January 2015. | Google will no longer be providing security patches for WebView used in pre-KitKat (v4.4) Android versions, meaning that over 60 percent of all Android users will be placed in danger.

Employees would sell passwords for $150

27 January 2015. | An alarming number of employees surveyed admitted they would sell their passwords, some for as little as $150 U.S. dollars.

How GitHub is redefining software development

26 January 2015. | The security industry is slowly realizing what the developer community knew for years - collaboration is the key to and likely the future of innovation.

How the Internet of Things impacts enterprise security

26 January 2015. | A new study examined the impact that emerging security threats connected with the Internet of Things have on enterprise security.


    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //