Please turn on your JavaScript for this page to function normally.
Volvo
Volvo to launch a car without a physical key

Can you imagine accessing and driving your car without a physical key? In a first for the automotive industry, Volvo is set to become the first car manufacturer to offer cars …

PacketFence
PacketFence: Free and open source network access control

PacketFence is a fully supported, free and open source network access control (NAC) solution. Its feature set includes a captive-portal for registration and remediation, …

W3C
W3C launches effort to replace passwords

The World Wide Web Consortium (W3C) is launching a new standards effort in web authentication that aims to offer a more secure and flexible alternative to password-based …

desk
(IN)SECURE Magazine issue 49 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 49 has been released today. Table of contents …

mitmproxy
Intercept, inspect and modify traffic flow with mitmproxy

mitmproxy is an interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed. All flows are kept in memory, which means that it’s …

paint
Welcome to the new Help Net Security

We’re all about keeping you updated with important security stories, but this time around we have some news about us. During the weekend we rolled out a brand new version of …

idea
5 ways to protect your company data from internal attacks

While Hollywood may love the image of the hacker lurking in the shadows, stealthily pillaging from across cyberspace, the reality is that threats from inside your network, …

statue
Surprise? Most organizations are not cyber resilient

71 percent of UK organisations would rate their cyber resilience as low today, underlining a lack of preparedness to handle cyberattacks by the majority of UK organisations, …

urban
Reactions to the EU-US Privacy Shield

The European Commission and the United States have agreed on a new framework for transatlantic data flows: the EU-US Privacy Shield. Here are some of the comments Help Net …

email
How email in transit can be intercepted using DNS hijacking

This post looks at how an attacker can intercept and read emails sent from one email provider to another by performing a DNS MX record hijacking attack. While our research on …

Information security innovation and the fast-paced threat landscape

Gary Warner recently became the Chief Threat Scientist at PhishMe. In this interview he talks about how his past positions prepared him for this new job title, information …

Ivan Ristic, SSL Labs
Ivan Ristic and SSL Labs: How one man changed the way we understand SSL

Ivan Ristic is well-known in the information security world, and his name has become almost a synonym for SSL Labs, a project he started in early 2009. Before that, he was …

Don't miss

Cybersecurity news