Automated threat management: No signature required

We keep doing the same thing over and over, expecting different results.

Apple patches serious remotely exploitable iTunes and App Store flaw

Security researcher Benjamin Kunz Mejri from Vulnerability Lab has discovered a serious vulnerability in Apple's App Store and iTunes web apps.

Security flaws discovered in popular Smart Home Hubs

Security experts worry about the privacy and safety risks associated with these devices since the technology is in relative infancy.

It's official: The average DDoS attack size is increasing

New global DDoS attack data shows strong growth in the average size of DDoS attacks, from both a bits-per-second and packets-per-second perspective.

Hacking Team's RCS Android: The most sophisticated Android malware ever exposed

RCS Android can do so many things and spy on so many levels that Trend Micro researchers consider it the most sophisticated Android malware ever exposed.

Spotlight

Chrome extension thwarts user profiling based on typing behavior

Infosec consultant Paul Moore came up with a working solution to thwart a type of behavioral profiling. The result is a Chrome extension called Keyboard Privacy, which prevents profiling of users by the way they type by randomizing the rate at which characters reach the DOM.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Wed, Jul 29th
Events
(ISC)2 Security Congress
28 September - 01 October 2015.

Editor's choice

Chrome extension thwarts user profiling based on typing behavior

A Chrome extension called Keyboard Privacy prevents profiling of users by the way they type by randomizing the rate at which characters reach the DOM.

One in 600 websites exposes sensitive info via easily accessible .git folder

Some developers don't know that git keeps track of the changes by storing them in a hidden folder.

Finally! A free, open source, on-premise virus scanner framework

Security researcher Robert Simmons has finally begun publishing the code and documentation for PlagueScanner.

The Internet of Things is unavoidable, securing it should be a priority

The IoT started like any other buzzword: poorly defined, used too often, and generally misunderstood. However, it stood the test of time and is now becoming part of everyday language.

How experts stay safe online and what non-experts can learn from them

Researchers have asked security experts and web-users who arenít security experts about their security best practices.


    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //