Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
cloud
Virtually all business cloud apps lack enterprise grade security

Blue Coat Systems analyzed apps for their ability to provide compliance, data protection, security controls and more. Of the 15,000 apps analyzed, it was revealed that 99 …

key
Businesses need to protect data, not just devices

As organizations embrace the digital transformation of their business, they are increasingly facing new security concerns. More companies are moving away from device-centric, …

Pwnie Express
Pwnie Express open sources IoT and Bluetooth security tools

Pwnie Express announced the availability of open sourced versions of its Blue Hydra and Android build system software. The release of these tools enable comprehensive …

IOActive
IOActive offers offensive security approach to risk assessment

IOActive launched its Advisory Services practice, offering strategic security consulting that leverages IOActive’s testing and research expertise to help customers …

Flashpoint dark web
Investigating the supply on 17 underground hacker markets

Have you ever wondered what kind of malicious offerings can be found on dark web “hacker markets,” who sells them and how widely they are available? Three …

HTML Source Code Viewer
Media-stealing Android app targets developers

Symantec researchers have unearthed another app on Google Play that secretly steals photos and videos from victims’ mobile devices. But the curious thing is that it’s …

Android
How Google protects the Android kernel, and future plans

On Wednesday, Jeff Vander Stoep of Google’s Android Security team took to the official Android Developers blog and shared some information about the defenses they have …

business
Cybersecurity talent crisis continues, technical skills in high demand

Intel Security, in partnership with the Center for Strategic and International Studies (CSIS), has released a global report outlining the talent shortage crisis impacting the …

Infection Monkey
Infection Monkey: Test a network from an attacker’s point of view

Infection Monkey, a tool designed to test the resiliency of modern data centers against cyber attacks, was developed as an open source tool by GuardiCore’s research …

magnify look search
Global network shares phishing attack intelligence in real-time

IRONSCALES, a multi-layered phishing mitigation solution that combines human intelligence with machine learning, today announced the launch of Federation, a product that will …

USA
Obama defines how the US government will respond to cyber incidents

US president Barack Obama approved on Tuesday the Presidential Policy Directive on United States Cyber Incident Coordination (PPD-41). What’s the PPD-41 all about? …

Osram Lightify
Osram’s intelligent home lighting system is riddled with flaws

“Intelligent” home lighting system Osram Lightify sports a number of security vulnerabilities, some of which could lead to compromise of the product and the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools