Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
15,435 vulnerabilities across 3,870 applications were recorded in 2014

In 2014, 15,435 vulnerabilities were discovered according to data from Secunia Research. The vulnerabilities are spread across 3,870 applications published by 500 different …

Implementing an effective risk management framework

In today’s marketplace, almost every employee is now a content contributor. Although beneficial to the collective of information available, this influx brings about new …

Mobile apps are not being tested for insecure behavior

Enterprises are not doing nearly enough to understand which mobile app behaviors hitting their networks and data are risky, nor are they testing apps for those risky behaviors …

One in three top Alexa websites is risky

Based on an analysis of the Alexa top one million sites, Menlo Security found that more than one in three of the top domains are either already compromised or running …

Organizations have little control over privileged access

Even though nearly half of IT decision makers admit they have employees with access rights not necessary to their current role, more than one out of four companies indicated …

RSA Conference 2015
Finalists announced for Innovation Sandbox at RSA Conference 2015

RSA Conference announced the 10 finalists for its annual Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of …

The average DDoS attack tripled in volume

The average packet volume for DDoS attacks increased 340 percent to 4.36 million packets per second (Mpps), and the average bit volume swelled 245 percent to 12.1 Gbps in the …

Hack air-gapped computers using heat

Ben-Gurion University of the Negev (BGU) researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way …

Sensitive data resides in the cloud

With the vast majority of enterprises now making use of cloud environments, 54 percent globally reported keeping sensitive information within the cloud, according to …

Four advantages of an identity behavior-based approach to cybersecurity

With an ever-increasing number of data breaches, more money is being poured into IT security budgets. According to Gartner, the average global security budget increased 8 …

Most parents don’t know how to tackle cyber bullying

54 percent of UK parents would have no idea if their child was being cyber bullied, highlighting that most parents are completely ill-equipped and under-educated in knowing …

Tails 1.3.1 emergecy release fixes security issues

Tails 1.3.1, is out. This is an emergency release, triggered by an unscheduled Firefox release meant to fix critical security issues. This version fixes numerous security …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools