Read more about week in review
Bookmark and Share
  • Week in review: Obama backs net neutrality, Darkhotel espionage, working at Pwnie Express

    17.11.2014

    Here's an overview of some of last week's most interesting news, interviews, articles and reviews: Darkhotel espionage campaign targets corporate executives traveling abroad Kaspersky Lab researched the Darkhotel espionage campaign, which has lurked in the shadows for at least four years while stealing sensitive data from selected corporate executives traveling abroad.

  • Week in review: Unprecedented iOS, OS X malware, secure messaging tech, Silk Road 2 takedown

    10.11.2014

    Here's an overview of some of last week's most interesting news, reviews and articles: Researchers audit the TextSecure encrypted messaging app A group of German researchers have audited TextSecure, the popular open source encrypted messaging application for Android, and the news is good.

  • Week in review: Critical Drupal 7 vulnerability, cloud myths, Ebola scams

    03.11.2014

    Here's an overview of some of last week's most interesting news and articles: Tor exit node found patching downloaded binaries with malware A researcher has spotted a Tor exit node located in Russia which instead of delivering the software requested by users untouched, was adding malicious code to the binaries in question - code that made their computers open a port to send HTTP requests to and receive commands from a remote server.

  • Week in review: Widespread malvertising, iCloud users under attack, and protecting yourself from electronic spying

    27.10.2014

    Here's an overview of some of last week's most interesting news and articles: The Software Assurance Marketplace: A response to a challenging problem The growing reliance on software makes us all vulnerable and susceptible to cyber attacks - and the quality of software is steadily declining.

  • Week in review: POODLE bug, Microsoft patches a slew of 0-days exploited in the wild

    20.10.2014

    Here's an overview of some of last week's most interesting news and articles: Identifying deceptive behavior in user-generated content In this interview, JT Buser, Manager of Authenticity and Fraud at Bazaarvoice, talks about challenges involved in identifying deceptive behavior in user-generated content as well as interesting techniques he's seen scammers use.




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //