Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Search
Monitoring scanning activities that could lead to IoT compromises

IoT devices are ideal targets for attackers looking to build DDoS botnets because they have limited or non-existent security features. Some IoT devices utilize hard-coded …

phone call
Can smartphone thieves be identified in seconds?

Ben-Gurion University of the Negev (BGU) researchers have developed a technique that identifies a smartphone thief or intruder in under 14 seconds. “While most people …

AlienVault USM Anywhere
USM Anywhere simplifies security for organizations of all sizes

AlienVault announced the availability of USM Anywhere, an all-in-one Software-as-a-Service (SaaS) security monitoring platform designed to centralize threat detection, …

Absolute
Self-healing endpoint security as a foundation for visibility

When it comes to persistent cyber threats, a majority of companies have resigned themselves to the fact they will be or are already infiltrated by an unknown adversary. It is …

person
Your web browsing history can be linked to your social media accounts

Your web browsing history contains enough information for third parties to be able to link it to your social media profile (Twitter, Facebook, Reddit), Stanford and Princeton …

Vizio Smart TV
Vizio smart TVs spied on millions of users without their consent

American company Vizio has decided to settle charges that it installed software on its smart TVs that collected viewing data of some 11 million users without their knowledge …

IoT
8.4 billion connected things will be in use worldwide in 2017

Gartner forecasts that 8.4 billion connected things will be in use worldwide in 2017, up 31 percent from 2016, and will reach 20.4 billion by 2020. Total spending on endpoints …

eye
Global biometrics market revenue to reach $15.1 billion by 2025

The biometrics market has reached a tipping point. Driven largely by the confluence of organizations’ desires to better authenticate or identify users and users’ distaste for …

Denuvo
Anti-piracy tech firm Denuvo inadvertently leaks sensitive info

Denuvo Software Solutions has suffered an embarrassing and potentially damaging information leak. Denuvo is an Austrian company well known for its anti-tamper technology and …

Gmail
Google is winding up Gmail support for older Chrome versions

Chrome users that, for whatever reason, can’t or don’t want to update to the latest version of the browser will soon start seeing warnings when they access Gmail. …

firefighters
Number of disclosed vulnerabilities reaches all time high in 2016

A new report shows 2016 broke the previous all-time record for the highest number of reported vulnerabilities. The 15,000 vulnerabilities cataloged during 2016 by Risk Based …

certificate
Scale, frequency and causes of certificate-related outages

Certificate-related outages negatively impact the reliability and availability of vital systems and services, according to Venafi. “Certificates and keys are identity and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools