Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Fileless attack framework was used in many recent attacks

In the last month or so, a number of security companies spotted attackers targeting a variety of organizations around the world with spear-phishing emails delivering …

Intel is offering up to $30,000 for bugs in its hardware

Intel has become the latest tech company to launch a bug bounty program. Intel bug bounty program: What’s in scope and what is not Intel is looking for bug hunters to …

rings
User info of millions of Wishbone users slurped by hackers

Science Inc., the company behind the popular online poll creation app Wishbone, has suffered a data breach. As a consequence, personal and account information of over 2.2 …

lips
Lip movement: Authentication through biometrics you can change

Choosing a unique, complex and long enough password that will still be easy to remember is a big challenge for most users, and most of them would happily opt for biometric …

blocks
Leaked: Personal info on 33+ million employees across the US

Personal and contact information on over 33 million employees of various US-based corporations and federal agencies like the Department of Defense has been leaked. The …

Microsoft logo
March Patch Tuesday closes record number of vulnerabilities

With no February Patch Tuesday, it was to be expected that Microsoft would fix a huge number of security issues in March. They didn’t disappoint: 139 unique CVEs have …

cybercrime
Online fraudsters’ preferred tools and techniques revealed

A new report by DataVisor Threat Labs has provided unprecedented insight into the behaviors and attack techniques of some of the world’s largest online crime rings, and …

ransomware
Organizations hit with Petya ransomware with a twist

Various organizations are being targeted by cyber crooks leveraging the infamous Petya ransomware. A modified Petya version inside a Trojan But victims will have a difficult …

data
Sensitive US Air Force data found exposed online

A misconfigured, unsecured backup drive containing a huge amount of sensitive (but not classified) data on US Air Force officers has been sitting online, accessible to anyone, …

Double Robotics Telepresence Robot
Double Robotics Telepresence Robot can be hacked

Rapid7 researchers have discovered a number of vulnerabilities in the Double Robotics Telepresence Robot, the company’s iPad-based telepresence device that looks a bit …

signature
A new age of digital signatures is upon us

The increased adoption of digital signatures should not come as a surprise: many businesses are trying to digitalise their everyday processes, and digital signatures are both …

danger
Intel’s CHIPSEC can detect CIA’s OS X rootkit

As details about CIA’s hacking capabilities and tools are, bit by bit, popping to the surface, companies are trying to offer users some piece of mind. In the wake of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools