Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Hands
Week in review: Email tracking, DNS exfiltration, and secure coding in Java

Here’s an overview of some of last week’s most interesting news and articles: Leaving employees to manage their own password security is a mistake Despite the …

password
Leaving employees to manage their own password security is a mistake

Despite the clear and present danger that weak passwords pose to organizations, many remain focused on implementing technology based on policy, not the user, to address the …

New infosec products of the week​: October 6, 2017

EclecticIQ Platform 2.0 gets intelligence reporting, new UI, and more To remove one of the biggest bottlenecks in threat investigation, EclecticIQ Platform 2.0 now includes …

brain
Most decision makers expect ROI from artificial intelligence within two years

Cylance polled 652 IT decision makers in the U.S., UK, Germany and France, and found that optimism about the value of artificial intelligence-powered solutions in the …

money
Worldwide IT spending to reach $3.7 trillion in 2018

Worldwide IT spending is projected to total $3.7 trillion in 2018, an increase of 4.3 percent from 2017 estimated spending of $3.5 trillion, according to the latest forecast …

Magento
PoC for several Magento vulnerabilities released, update now!

DefenseCode has published proof of concept code for two CSRF and stored XSS vulnerabilities affecting a number of versions of the popular e-commerce platform Magento. Magento …

Office 365
KnockKnock campaign targets Office 365 corporate email accounts

Researchers uncovered KnockKnock, an attack on Office 365 Exchange Online email accounts, originating from 16 countries around the world and targeted organizations in …

lock
Beyond GDPR: Data protection as a competitive advantage

A new McAfee report shows that 48 percent of organizations will migrate their data to a new location because of regulations like GDPR. A similar amount will migrate their data …

Laptop
The privacy implications of email tracking

Emails are a widely used means for third parties to tie your email address to your activities across the web, Princeton University researchers have discovered. The extent of …

laptop
Most network endpoints are in the dark: Do you know how to find them?

Traditional manual endpoint security approaches are ineffective and resource-intensive, leading to neglect of basic maintenance such as patches and updates, according to …

energy
Outsmarting grid security threats

Almost two-thirds (63 percent) of utility executives believe their country faces at least a moderate risk of electricity supply interruption from a cyberattack on electric …

people
IT concerned about losing jobs while industry worried about IT talent shortage

While the cybersecurity industry is desperately trying to manage a worldwide shortage of qualified cybersecurity professionals, 56 percent of these professionals fear they’ll …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools