Read more about data theft
Bookmark and Share
  • Breaches expose 552 million identities in 2013

    10.04.2014

    After lurking in the shadows for the first ten months of 2013, cybercriminals unleashed the most damaging series of cyberattacks in history.

  • Universities are a rich target for hackers

    09.04.2014

    In 2013, HALOCK Security Labs noted information security vulnerabilities at colleges and universities along with numerous challenges that plague these institutions across the United States.

  • German police finds 18M stolen and misused account logins

    04.04.2014

    Police in northwestern German city of Verden have discovered a collection of 18 million stolen email addresses and corresponding passwords that are being actively used to send out spam, compromise social networks' accounts and event to occasionally plunder the victims' banking accounts.

  • 550k+ card details stolen in 17-month long Spec's breach

    02.04.2014

    Texan liquor chain Spec's has been breached, and personal and financial information of over half a million of its customers has been compromised in a breach that lasted nearly a year and a half.

  • Passwords, messages of 158k+ Boxee.tv users leaked

    02.04.2014

    The forum database of Web TV service Boxee.tv has been ransacked and the attacker made off with - and has subsequently made available for download - a dump containing personal and account information of over 158,000 of its users.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //