Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Europe
EU-US Privacy Shield: New framework for transatlantic data flows

The European Commission and the United States have agreed on a new framework for transatlantic data flows: the EU-US Privacy Shield. The College of Commissioners approved the …

eBay
Severe and unpatched eBay vulnerability allows attackers to distribute malware

Check Point researchers have discovered a severe vulnerability in eBay’s online sales platform, which allows criminals to distribute malware and run phishing campaigns. …

Fitbit
Security and privacy issues plague wearable fitness tracking devices

A new report is describing major security and privacy issues in several leading wearable fitness tracking devices and accompanying mobile applications. The research examined …

Business
Your board and cyber risk: Reimagining security protocols from the top down

As scrutiny of well-known financial services firms’ security practices continues to make news, the SEC has chosen to turn its attention to risks facing a certain subset of the …

money
Exposing the economics behind cyber attacks

A new survey by the Ponemon Institute provides insight into topics like the average earnings of a cyberattacker, the amount of time attacks typically take, and how to prevent …

fire
Reactions to the HSBC DDoS attack

Last week HSBC’s online banking website was taken down by a DDoS attack, leaving thousands of customers unable to access its services. Here are some of the comments Help Net …

Android
Android users on high alert as malware, phishing and scams are projected to rise

Android phones are popular and growing more so every day. According to research firm IDC, there were close to 350 million active smartphones worldwide in the second quarter of …

Tails
Tails 2.0 fixes many security issues

Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity. Tails 2.0 is …

energy
Defending the smart grid: What security measures to implement

Smart grids are a fundamental component of the European critical infrastructure. They are rooted on communication networks that have become essential elements allowing the …

Week in review: The death of Java plugin, Magento fixes e-store hijacking flaw, cybercriminals targeting healthcare data

Here’s an overview of some of last week’s most interesting news and articles: There’s no turning back: Say goodbye to the perimeter If you’ve been following …

deep web
The history of cyber attacks: From ancient to modern

In the 1990s, your typical hacker’s approach used to be “hit-and-run”, and in many cases it was about fame and recognition. Back in those days most organizations only had a …

Compromised enterprise networks fuel 236 percent increase in viruses and worms

Solutionary performed a broad analysis of the threat landscape, which uncovered several key findings. One of the most compelling finding links the rapid growth (236 percent) …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools