Jesteś tu :  Główna Help Net Security Help Net Secutity
Help Net Secutity
Help Net Security
Daily information security news with a focus on enterprise security.

  • Blackhole exploit kit author sentenced
    Dmitry Fedotov, aka “Paunch”, the creator of the infamous Blackhole and Cool exploit kits, has been sentenced to spend 7 years in prison, Russian news agency TASS has reported (in Russian). Six of his criminal collaborators have also been handled prison sentences, spanning from 5.5 years to 8, and they...

  • Why few US consumers penalize hacked companies?
    About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of those who have ever been notified say they stopped doing business with the hacked company after the event occurred, according...

  • Cisco UCS servers can be hijacked with malicious HTTP request
    A data center server platform running Cisco’s Unified Computing System (UCS) Central Software can be compromised by unauthenticated, remote attackers with a single, malicious HTTP request, security researcher Gregory Draperi has discovered. The Cisco UCS platform was designed to help organizations efficiently manage distributed Cisco UCS servers at scale. Cisco...

  • EU privacy watchdogs not satisfied with the EU-US Privacy Shield
    The Article 29 Working Party – an advisory body composed of representatives of the data protection authority of each EU Member State, the European Data Protection Supervisor and the European Commission – is not satisfied with the new EU-US Privacy Shield agreement, and has offered advice on changes that should...

  • Why the smart office is highly susceptible to data breaches
    The Edge in Amsterdam is one of the smartest office buildings in the world. The state-of-the-art offices include 28,000 connected sensors for motion, light, temperature, humidity and other conditions, which can all be detected and adjusted to suit workers’ needs. Further control is available through a mobile application which can...

  • Software tools and services used to achieve ISO 27001
    With high profile breaches becoming almost a daily occurrence in the media, many organizations are now turning to the ISO 27001 information security standard to help them stay out of the press and prove to their customers that they take security seriously. Even with a strong management commitment, adoption can...

  • Security tips and tricks for businesses and consumers
    In 2015, the number of zero-day vulnerabilities discovered more than doubled to a record-breaking 54, a 125 percent increase from the year before, reaffirming the critical role they play in lucrative targeted attacks, according to Symantec’s Internet Security Threat Report. As attackers evolve, there are many steps businesses and consumers...

  • Public institutions targeted with shape changing Qbot malware
    A new strain of Qbot, malicious software that steals user credentials and creates backdoors on targeted devices, has infected over 54,000 PCs in thousands of organisations across the world, BAE System experts have found. Following an attack on a public sector organisation in early 2016 that affected more than 500...

  • Samsung Galaxy devices can be made to make calls, send messages while locked
    Half a dozen (and possibly even more) Samsung Galaxy phones can be made to place phone calls or send text messages even when they are locked, thanks to exposed USB modems. Researchers Roberto Paleari and Aristide Fattori who, a few months back, demonstrated the lock screen bypass attack on a...

  • After issuing 1.7M certificates, Let’s Encrypt CA officially leaving beta
    Let’s Encrypt, the non-profit Certificate Authority (CA) backed by the Electronic Frontier Foundation, Mozilla, Cisco, Akamai, and others, is ready to be considered a stable offering. “Since our beta began in September 2015 we’ve issued more than 1.7 million certificates for more than 3.8 million websites. We’ve gained tremendous operational...