Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
mobile devices
Will the next major data breach start on mobile?

Over the past few years, we have seen a spike in major data breaches from noteworthy businesses such as Target, Home Depot, and Sony (to just name a few). While data breaches …

Biohazard
Unsurprisingly, malware incidents set to grow

Up to half of US organizations have experienced malware attacks which have had a severe impact on their business operations, according to new research by IDG Connect. Forty …

Abstract
Week in review: Windows 0day for sale, and lessons learned from 17 years as an infosec trainer

Here’s an overview of some of last week’s most interesting news, reviews and articles: ICS-focused IRONGATE malware has some interesting tricks up its sleeve …

Tech
What is the actual value of a CISO?

For some people, it’s hard to understand what keeps them up at night. For you, the CISO, things are much clearer. Your 3:47 am thoughts are filled with data breaches, malware, …

touchscreen
Surprise! Most IoT products have inadequate security

While the IoT era of products brings innumerable advances and modern conveniences to the lives of consumers, the connected nature of these products creates unintentional ports …

bridge
Are you prepared for future information management requirements?

While 46 percent of federal information management professionals cite managing all types of information assets, regardless of format, as a priority for their field, many feel …

Google Chrome
Google Chrome update includes 15 security fixes

Google has released Chrome 51.0.2704.79 to address multiple vulnerabilities for Windows, Linux, and OS X. Exploitation of some of these vulnerabilities may allow a remote …

Saumil Shah, Saumil Shah, CEO at Net-Square
What 17 years as an infosec trainer have taught me

July 2016 shall see me complete 17 years in the infosec training circuit. It has been an amazing journey, with humble beginnings. How it all started I had a strong academic …

industry
Cyber risks for utilities, networks, and smart factories escalate

Three utilities companies in the Ukraine, the Israel National Electricity Authority and most recently a German nuclear power plant have suffered cyber attacks in recent …

Borderless Cyber Europe
Borderless Cyber Europe 2016 to emphasize the importance of threat intelligence sharing

On 8-9 September, OASIS will host Borderless Cyber Europe 2016 at the European Commission Headquarters in Brussels, Belgium. The excitement for this year’s event has …

hard drive
Mobile workforce exposes businesses to security vulnerabilities

U.S. business leaders are unprepared for the increased threat to information security that comes with flexible office environments. A Shred-it study shows that leaders are not …

Tor browser
Tor Browser 6.0 released

The Tor Browser lets you use Tor on Windows, OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools