Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
patching cloud
Top risks identified across private cloud environments

Based on data gathered from over 100 enterprise environments over the past year, a Continuity Software study found that downtime and security risks were present in each cloud …

Businessman juggling
Business strategy and innovation framework for the industrial IoT

The Industrial Internet Consortium (IIC), the global, member-supported organization that promotes the accelerated growth of the Industrial Internet of Things (IIoT), announced …

poisontap
Low-cost PoisonTap tool can compromise locked computers

A new attack tool devised by security researcher Samy Kamkar will leave you wishing you could take your computer with you everywhere you go. Dubbed PoisonTap, the tool …

danger
Final warning: Popular browsers will soon stop accepting SHA-1 certificates

Starting with Chrome 56, planned to be released to the wider public at the end of January 2017, Google will remove support for SHA-1 certificates. Other browser makers plan to …

ransoc ransomware
Ransoc browser locker/ransomware blackmails victims

An unusual combination of browser locker and ransomware, dubbed Ransoc by researchers, is targeting users who visit adult sites. Ransoc targets victims’ reputation The …

vault
The decline of cyber resilience: Organizations unprepared to face attacks

Only 32 percent of IT and security professionals say their organisation has a high level of cyber resilience – down slightly from 35 percent in 2015, according to a global …

Windows
Researchers identify domain-level service credential exploit

CyberArk Labs unveiled new research detailing what it considers to be a significant risk across all Windows endpoints, including those on Windows 10 with Credential Guard …

skull
While consumers remain complacent, hackers refine their skills

A new Norton Cyber Security Insights Report found that consumers who were victims of cybercrime within the past year often continued their unsafe behavior. For example, while …

match fire
Cyber risk in advanced manufacturing: How to be secure and resilient

Nearly half of surveyed manufacturing executives lack confidence their assets are protected from external threats, according to a new study from Deloitte and the Manufacturers …

Android
Dangerous Android threat points to Italian spyware maker

A piece of Android spyware recently analyzed by researchers with the RedNaga Security team seemed to be yet another Hacking Team spying tool but, according to more recent …

cloud
Insufficient security measures still hinder cloud adoption

Security and privacy of data and systems in the cloud remains a top worry for 70% of IT professionals worldwide, up from 63% in 2015, according to a new Cloud Security Survey …

Firefox
With Firefox 50, Mozilla plugs many security holes

Firefox 50 is out, and it includes security fixes for 3 critical, 12 high, 10 moderate, and 2 low severity issues, as well as many usability improvements. Two of the critical …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools