Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
connected
Biggest limiting factors to universal adoption of connected devices

After surveying 250 respondents at CES 2017, the Open Connectivity Foundation (OCF) concluded that more than 60 percent of respondents consider standardization and …

structure
New attack sounds death knell for widely used SHA-1 crypto hash function

SHA-1 is definitely, provenly dead, as a group of researchers from CWI Institute in Amsterdam and Google have demonstrated the first practical technique for generating a …

Deutsche Telekom
Suspected Deutsche Telekom router hacker arrested

A 29-year-old British national, believed to be the mastermind behind last November’s unsuccessful hijacking attempt of Deutsche Telekom users’ routers, was …

employee
Removing admin rights mitigates most critical Microsoft vulnerabilities

Avecto has analyzed the security bulletins Microsoft released in the past year, and came to an important conclusion: an overwhelming majority of all the critical Microsoft …

woman
Women in infosec: Real-life experiences and challenges

In all segments of society and business, minorities encounter problems that the majority rarely or never faces. And information security is – I think we can all agree …

Passages
Passages: Secure virtual browser for malware isolation

Over 90% of undetected attacks come through the web. In this podcast recorded at RSA Conference 2017, Lance Cottrell, Chief Scientist at Ntrepid, talks about Passages, a …

macOS ransomware
New macOS ransomware masquerades as software cracking tools

New crypto ransomware dubbed Filecoder (aka Findzip) is stalking macOS users, ESET researchers warn. Masquerading as an application for cracking/patching legal copies of Adobe …

healthcare
The devastating impact of healthcare data breaches

One in four U.S. consumers have had their personal medical information stolen from technology systems, according to Accenture. The findings show that half of those who …

architecture
Key obstacles to digital transformation and data privacy compliance

To stay relevant in an increasingly digital world, companies are either starting to or are currently in the process of transforming their digital environment to improve …

decision
Stethoscope spurs employees to implement better security practices

Every now and then, Netflix open sources some of the security tools created by its coders. The latest example of this is Stethoscope, a web application that collects …

Chrome
Cyber crooks’ latest tricks for targeting Chrome users

Chrome users have lately been targeted with a few unusual malware delivery and scam attempts. The “font wasn’t found” trick The first one comes from compromised WordPress …

alert
Microsoft pushes out patches for critical Flash Player vulnerabilities

Microsoft has skipped its February 2017 Patch Tuesday and postponed the release of those patches for March, but there are apparently security vulnerabilities that must be …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools