Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
money
What’s the real cost of a security breach?

The majority of business decision makers admit that their organisation will suffer an information security breach and that the cost of recovery could start from around $1 …

Connect
Network forensic analysis tool NetworkMiner 2.0 released

NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any …

Most IT pros have seen potentially embarrassing information about their colleagues

More than three-quarters of IT professionals have seen and kept secret potentially embarrassing information about their colleagues, according to new research conducted by …

Broken glass
The return of Carbanak: Banks face new attacks

A year after Kaspersky Lab warned that cyber-criminals would start to adopt the tools and tactics of nation-state backed APTs in order to rob banks, the company has confirmed …

Danger
Sensitive data stolen in Gyft data breach

Gyft, a digital gift card platform that enables you to buy, send, and manage gift cards from hundreds of retailers, is notifying users who may have been affected by a security …

binary
Week in review: EU-US Privacy Shield, using AI to build an army of virtual analysts

Here’s an overview of some of last week’s most interesting news and articles: Fake Amazon survey-for-money offer leads to account compromise “As a valued …

RSA Conference
Cloud Security Alliance hackathon offers $10,000 prize

The Cloud Security Alliance (CSA) will hold its fourth hackathon at the RSA Conference 2016 in San Francisco, to continue to test the CSA Software Defined Perimeter (SDP) …

general
Modern IRM: Securing the future of work

No matter what business you’re in, the one thing you produce more than anything else is text. Every day, you and your colleagues are creating, discussing, and documenting …

Europe
EU-US Privacy Shield: New framework for transatlantic data flows

The European Commission and the United States have agreed on a new framework for transatlantic data flows: the EU-US Privacy Shield. The College of Commissioners approved the …

eBay
Severe and unpatched eBay vulnerability allows attackers to distribute malware

Check Point researchers have discovered a severe vulnerability in eBay’s online sales platform, which allows criminals to distribute malware and run phishing campaigns. …

Fitbit
Security and privacy issues plague wearable fitness tracking devices

A new report is describing major security and privacy issues in several leading wearable fitness tracking devices and accompanying mobile applications. The research examined …

Business
Your board and cyber risk: Reimagining security protocols from the top down

As scrutiny of well-known financial services firms’ security practices continues to make news, the SEC has chosen to turn its attention to risks facing a certain subset of the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools