Security News > 2016 > December
![Netgear Routers Remain Exposed to Critical Flaw (Threatpost)](/static/build/img/news/alt/crypto-stat-small.jpg)
Netgear has confirmed a critical vulnerability in its Nighthawk routers that expose devices to command injection attacks. A public exploit is available.
![Alpha Version of Sandboxed Tor Browser Released (Threatpost)](/static/build/img/news/alt/cloud-cybersecurity-statistics-small.jpg)
A sandboxed alpha version of the Tor Browser was released over the weekend and while there are still some rough edges and bugs, it could be a step toward protecting Tor users from recent...
![Law enforcement operation targets users of DDoS tools (Help Net Security)](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
From 5 to 9 December 2016, Europol and law enforcement authorities from Australia, Belgium, France, Hungary, Lithuania, the Netherlands, Norway, Portugal, Romania, Spain, Sweden, the United...
![German Industrial Giant Victim of Cyber Espionage (Threatpost)](/static/build/img/news/alt/phishing-stats-2-small.jpg)
German industrial firm ThyssenKrupp said it’s working with authorities to investigate a data breach of unspecified amount of internal data.
![Critical flaw opens Netgear routers to hijacking (Help Net Security)](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
Several Netgear router models can be easily hijacked by remote, unauthenticated attackers, CERT/CC has warned on Friday. The vulnerability that allows this takeover can be exploited by simply...
![How to create a safer shopping experience (Help Net Security)](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
The annual holiday season has arrived. The air grows crisp (at least in the Northern hemisphere), new, cool gadgets are released and cyberattacks, along with cologne ads, proliferate. Cyber...
![12 tips for implementing secure business practices (Help Net Security)](/static/build/img/news/alt/antivirus-stats-small.jpg)
Optiv Security shared a list of a dozen tips for implementing secure business practices during the 2016 holiday season. Security experts developed these recommendations to help security and IT...
![Ransomware Meets Multi-level Marketing (Schneier on Security)](/static/build/img/news/alt/ransomware-statistics-small.jpg)
A new ransomware, Popcorn Time, gives users the option of infecting others in lieu of paying the ransom. Related: a good general article on ransomware....
![New minimum code signing requirements for use by all CAs (Help Net Security)](/static/build/img/news/alt/hackers-statistics-small.jpg)
The Certificate Authority Security Council (CASC), an advocacy group committed to the advancement web security, announced the Code Signing Working Group has released new Minimum Requirements for...
![Waterfall Security: Impact of IIoT on cybersecurity (Help Net Security)](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
Ten or twenty years ago, the protection of a critical piece of industrial infrastructure meant building a wall around it – or at least a perimeter fence with razor wire on the top. Admission to...