Read more about honeypots
Bookmark and Share
  • Infographic: Honeypot cloud security data

    15.08.2014

    New infographic data on hackers reveals that Russia stealing passwords is the least of our cyber worries.

  • Deploying and monitoring honeypots made easy

    07.08.2014

    At the Black Hat conference, LogRhythm released a new analytics suite that monitors honeypots to track would-be attackers, enabling customers to analyze nefarious tactics and generate targeted threat intelligence that facilitates an ongoing adaptive defense posture.

  • DEF CON contest to help track down illegal robocalls

    17.06.2014

    The Federal Trade Commission is looking to expand the technological arsenal that can be used in the battle against illegal phone spammers by challenging DEF CON 22 attendees to build the ultimate honeypot to lure in and identify perpetrators of illegal robocalls.

  • Researcher sets up honeypot to counterattack, identifies attackers

    27.03.2013

    I believe that most infosec professionals have, at one time or other, wished they could fight back when some of the resources they are tasked with protecting came under attack by hackers.

  • Understanding basic honeypot concepts

    22.11.2012

    The EU cyber security Agency ENISA is launching an in-depth study on 30 different digital traps or honeypots that can be used by CERTs to proactively detect cyber attacks.




Spotlight

Cloned, booby-trapped Dark Web sites steal bitcoins, login credentials

Apart from being a way for dissidents and journalists to do their business without being spotted and identified by "the powers that be", the Dark Web is also a place where criminals sell and buy illegal wares and services and, apparently, where they also get robbed by scammers.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Jul 3rd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //