Google and Dell Open-Source Two Security Tools

Google and Dell Open-Source Two Security Tools

Dell open-sources an AD honeypot server, Google releases some questionnaires for assessing a company's security status

These Are the Top Usernames and Passwords Attackers Use When Hacking Your Server

These Are the Top Usernames and Passwords Attackers Use When Hacking Your Server

Most hackers think servers are protected by the password "x"

  • Security
  • By Catalin Cimpanu
  • February 18th, 2016
Dark Web Honeypot Shows How Quickly Leaked Passwords Attract Hackers

Dark Web Honeypot Shows How Quickly Leaked Passwords Attract Hackers

The conclusion: Don't reuse your passwords

  • Security
  • By Catalin Cimpanu
  • February 14th, 2016
Phishing Campaign Targets Cybercriminals for Once

Phishing Campaign Targets Cybercriminals for Once

AlphaBay phishing campaign detected in the wild

Infamous Hacking Forum Hell Returns Online, Raises Questions of Trust

Infamous Hacking Forum Hell Returns Online, Raises Questions of Trust

Most users believe it to be a blatant honeytrap

  • Security
  • By Catalin Cimpanu
  • December 23rd, 2015
Hackers Are Already Using the Secret Juniper Firewall Backdoor in Their Attacks

Hackers Are Already Using the Secret Juniper Firewall Backdoor in Their Attacks

Honeypot experiment shows growing interest from attackers in vulnerable Juniper NetScreen firewall equipment

  • Security
  • By Catalin Cimpanu
  • December 14th, 2015
Researchers Fail to Set Up Proper Honeypots <em>UPDATE</em>

Researchers Fail to Set Up Proper Honeypots UPDATE

Weak honeypots means unimportant security intel

Honeypot Records 8,000 Attacks Exploiting RCE Flaw in Elasticsearch

Honeypot Records 8,000 Attacks Exploiting RCE Flaw in Elasticsearch

Most of the assaults originate from machines in China

Pirate Party President Logs WiFi Traffic at Major Security Conference in Sweden

Pirate Party President Logs WiFi Traffic at Major Security Conference in Sweden

Around 100 people connected to the insecure network

Raspberry Pi Used for Building Honeypots on a Budget

Raspberry Pi Used for Building Honeypots on a Budget

Intern at security company builds cheap honeypot sensors

Honeypot Solution HoneyDrive Receives Update to Version 3

Honeypot Solution HoneyDrive Receives Update to Version 3

Includes new honeypot-related software and tools for researchers

Easier Honeypot Deployment and Management with Modern Honey Network

Easier Honeypot Deployment and Management with Modern Honey Network

Open source tool for automating the setup and management of honeypots

Copyright Troll Caught Seeding the Torrents It Then Sued People Over

Copyright Troll Caught Seeding the Torrents It Then Sued People Over

Prenda Law was actively sharing the movies, it then alleged people were pirating

Expert Sets Up ICS Honeypots to See Where Most Attacks Come From

Expert Sets Up ICS Honeypots to See Where Most Attacks Come From

39 cyberattacks were recorded during a 29-day period

ENISA Releases Report on the Use of Honeypots to Detect Cyberattacks

ENISA Releases Report on the Use of Honeypots to Detect Cyberattacks

CERTs are not using such resources as much as they should

Ghost Honeypot Released to Capture Malware That Spreads via USB

Ghost Honeypot Released to Capture Malware That Spreads via USB

Here's a video in which one of the developers shows how it works

  • Security
  • By Lucian Constantin
  • February 3rd, 2011
Microsoft Accuses Google of Click Fraud

Microsoft Accuses Google of Click Fraud

 
Want more? Browse: