Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Next Level Security Systems releases mobile apps

Next Level Security Systems released the NLSS Gateway 2.3, a new version of the NLSS Gateway that includes the power of a customized management tool, and NextMobile, a mobile …

Video surveillance on Cisco Unified Computing System

Cisco announced that its Video Surveillance software is available on the Unified Computing System (Cisco UCS) platform, now in use by more than 11,000 customers. Cisco …

Syrian dissidents claim government uses malware to spy on them

Syrian opposition activists have been targeted by the government since the start of the massive anti-government protests in January 2011, but only recently they have began to …

FBI in the market for app to monitor social networks

The US FBI is looking into the possibility of using an “Open Source and social media alert, mapping, and analysis application” for increasing its situational …

Police system compromised due to parental spying

The Patras program, used by the German Federal Police for surveillance and tracking of suspects and their vehicles via GPS, has recently been suspended for a while and its …

SDK advances face recognition for large surveillance systems

Neurotechnology announced VeriLook Surveillance 2.0, a SDK for biometric face identification using live video streams from single or multiple high-resolution digital …

EU wants firms to stop selling surveillance tools to repressive regimes

We are all aware of the fact that some regimes have no qualms about spying on their citizens in order to keep tabs on dissenters. Nevertheless, last week’s revelation by …

Cybercrime and Espionage

The authors, seasoned experts in the information security field with obvious intelligence insights, provide the readers with an interesting overview of the current biggest …

Flash bug allows spying of website visitors through webcam

A slight variation of a previously designed clickjacking attack that used a Adobe Flash vulnerability has once again made it possible for website administrators to …

How the German “Federal Trojan” was actually used

After the Chaos Computer Club hackers made public the results of their analysis of a few samples of the so-called “Federal Trojan” and found it capable of more …

Law enforcement increasingly asking Internet companies to share data

The fact that one can find out a lot about a person’s interests, movements and opinions from their Facebook and Twitter accounts, Google searches and messages exchanged …

A new approach to circumventing state-level Internet censorship

A group of researchers led by J. Alex Halderman, assistant professor of electrical engineering and computer science at the University of Michigan, have been working on a new …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools