Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
PC
Java and Flash top list of most outdated programs on users’ PCs

52% of the most popular PC applications, including Flash and Java, are out-of-date. People are exposing their PC and their personal data to risks, as malware targets older …

architecture
3 sour notes interrupting security operations harmony

Great musicians and instruments alone do not make beautiful music. It is the conductor who leads the orchestra and turns the collection of sounds into perfectly executed …

arrows
Will most security operations transition to the cloud?

Companies across industries are increasingly leveraging the cloud for security applications, with 42 percent indicating they currently run security applications in the cloud …

Police
Lithuanian arrested for $100 million BEC scams

Criminal charges were announced against Evaldas Rimasauskas for orchestrating a fraudulent business email compromise (BEC) scheme that induced two U.S.-based Internet …

authentication
Online banking customers remain extremely frustrated with passwords

A new survey by iovation and Aite Group, polled nearly 1,100 consumers across four generations who use online and/or mobile banking platforms to better understand their …

DevSecOps
Software development teams embrace DevSecOps automation

Mature development organizations ensure automated security is woven into their DevOps practice, early, everywhere, and at scale, according to Sonatype. The adoption of DevOps …

hybrid IT
Hybrid IT is becoming a standard enterprise model

Dimension Data research of 1,500 IT decision makers from multiple vertical industries across the US, Europe, Asia-Pacific and South Africa, reveals that hybrid IT is becoming …

future
Endpoint security is only one piece of the puzzle

Like many of you, I attended RSAC in February. Wading through the crowd of more than 43,000 people, I was interested to see how many new and improved endpoint security …

risk
Managing third-party risk: Dominant trends

One in five organizations has faced significant risk exposure due to a third party in the last 18 months. Of those who shared loss data, 25% said that the loss impact was …

password unlock
Organizations still vulnerable to brute force attacks

While increases in malware are clearly a major threat to both enterprises and service providers, network complexity is creating its own vulnerability, according to Ixia. The …

calculator
Cyber insurance: What and why?

High-profile cyber-attacks are fast becoming the norm in modern society, with 2016 being arguably the worst year for major security breaches. National Crime Agency statistics …

world
Week in review: WhatsApp flaw, lip motion passwords, reinventing software patching

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Vulnerability in WhatsApp and Telegram allowed complete account takeover …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools