Security News

Week in review: DROWN attack breaks TLS encryption, hijacking police drones, RSA Conference 2016 coverage (Help Net Security)
2016-03-07 12:51

Here’s an overview of some of last week’s most interesting news, reviews and articles: RSA Conference 2016 coverage Check out our coverage page to see what you’ve missed at RSA Conference 2016....

Researcher demonstrates hijacking of police drone (Help Net Security)
2016-03-03 23:26

A security researcher has demonstrated to the RSA Conference crowd how he – or anyone, for that matter – can take over control of a drone used by the Dutch police and make it do anything the...

E-commerce web apps vulnerable to hijacking, database compromise (Help Net Security)
2016-02-18 21:00

High-Tech Bridge researchers have published details and PoC exploit code for several serious vulnerabilities in Osclass, osCmax, and osCommerce, three popular open source e-commerce web apps....

Week in review: The death of Java plugin, Magento fixes e-store hijacking flaw, cybercriminals targeting healthcare data (Help Net Security)
2016-02-01 06:54

Here's an overview of some of last week's most interesting news and articles: There's no turning back: Say goodbye to the perimeter If you’ve been following the announcements from this year’s Co...

Cisco plugs hole in firewall devices that could lead to device hijacking (Help Net Security)
2016-01-28 11:00

Cisco has released a firmware update that plugs a critical, easy-to-exploit vulnerability that could allow a remote attacker to take control of the company's RV220W Wireless Network Security Firewall ...

Magento plugs XSS holes that can lead to e-store hijacking, patch immediately! (Help Net Security)
2016-01-25 09:18

Last week, Magento released a very important bundle of patches for their eponymous e-commerce platform that should be implemented as soon as possible. The bundle plugs a number of critical vulnerab...

How email in transit can be intercepted using DNS hijacking (Help Net Security)
2016-01-18 08:00

This article looks at how an attacker can intercept and read emails sent from one email provider to another by performing a DNS MX record hijacking attack. While our research on the state of email ...