Security News

How to quickly deploy a honeypot with Kali Linux
2019-10-02 15:19

Lure possible attackers into a trap with a Kali Linux honeypot.

Attack Traffic Caught by Honeypots Triples Over Six Months
2019-09-12 18:40

The attack traffic recorded by F-Secure's global network of honeypots tripled from the last six months of 2018 to the first six months of 2019. In H2 2018, the network recorded 813 million...

Ep. 027 – Honeypots, GPS rollover and the MySpace data vortex
2019-04-10 14:30

Guess how long it takes crooks to find a new device when you plug it in? All this and more in the latest Naked Security podcast- enjoy!

Extortionist lawyer pleads guilty to creating porn honeypot
2018-08-22 11:47

Prenda Law masterminds Paul Hansmeier and John Steele filmed and uploaded the videos, then sued the "John Does" who downloaded them.

Honeypot Highlights Danger to ICS Systems From Criminal Hackers
2018-08-07 13:40

A security firm established a sophisticated honeypot masquerading as a power transmission substation for a major electricity provider. The purpose was to attract attackers and analyze how they...

Cyberboffins drill into World Cup cyber honeypot used to lure Israeli soldiers
2018-07-05 12:30

Israel claiming it was Hamas Security researchers have unpicked mobile apps and spyware that infected the mobile devices of Israeli military personnel in a targeted campaign which the state has...

Wi-Fi honeypots: Alive and well at RSAC 2018
2018-04-30 11:45

It was a gorgeous, sunny week in San Francisco as the best and brightest security experts around the globe gathered to attend one of the leading cybersecurity tradeshows in the industry – RSA...

Honeypot Shows the Power of Automation in the Hands of Hackers
2018-04-18 15:46

Honeypot Experiment Shows the Commoditization of Using Bots to Perform Low-level Hacking Tasks read more

Stories From Two Years in an IoT Honeypot (Threatpost)
2017-04-14 12:00

A researcher at this year's Security Analyst Summit staged a series of honeypots at his friends’ houses to record IoT traffic, exploit attempts and other statistics.