15,000 spam emails have hit the inboxes of Android users in recent days

Thousands of Android users are at risk of having their mobile devices and private contents locked by a particularly ruthless ransomware that demands $500 to restore access.

Travel smart: Tips for staying secure on the road

Whether you're taking a personal holiday or a business trip, make sure your security best practices are coming along for the ride.

Android factory reset not enough to keep data secure

If you sell or gift your old Android phone to someone, is it enough to do a factory reset to wipe all your sensitive data?

Personal info of 1.1M customers stolen in CareFirst breach

CareFirst, a Blue Cross Blue Shield plan, have suffered a breach in which the attackers gained access to one of their databases.

DDoS attacks double, old web application attack vectors still active

Akamai Technologies analyzed thousands of DDoS attacks as well as nearly millions of web application attack triggers across the Akamai Edge network.

Spotlight

Travel smart: Tips for staying secure on the road

Whether you're taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your security best practices are coming along for the ride.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, May 26th
Events
HITBSecConf2015 Amsterdam
26 May - 29 May 2015.
Black Hat USA 2015
01 August - 06 August 2015.

Editor's choice

The importance of encryption and key management for security practitioners

Tsion Gonen, Chief Strategy Officer at Gemalto, talks about how if you're going to do encryption, make sure you do it right.

Companies stay vulnerable to web attacks for far too long

While no true security best practices exist, the key is in identifying the security metrics that mean the most to the organization.

DDoS attacks double, old web application attack vectors still active

Akamai Technologies analyzed thousands of DDoS attacks as well as nearly millions of web application attack triggers across the Akamai Edge network.

Trojanized, info-stealing PuTTY version lurking online

A malicious version of the popular open source SSH client PuTTY has been spotted and analyzed by Symantec researchers, and found to have information-stealing capabilities.


    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //