Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
industry
Cyber risks for utilities, networks, and smart factories escalate

Three utilities companies in the Ukraine, the Israel National Electricity Authority and most recently a German nuclear power plant have suffered cyber attacks in recent …

Borderless Cyber Europe
Borderless Cyber Europe 2016 to emphasize the importance of threat intelligence sharing

On 8-9 September, OASIS will host Borderless Cyber Europe 2016 at the European Commission Headquarters in Brussels, Belgium. The excitement for this year’s event has …

Bug
Bug poachers target businesses, demand money for bug info

Businesses are being hit with an extortion attempt based on attackers penetrating their network or websites and stealing corporate or user data. The attackers don’t say …

Windows
Windows zero-day exploit offered for sale on underground market

Someone is selling an exploit for a Windows zero-day on an underground market for Russian-speaking cyber criminals, and the current price is set at $90,000. Trustwave …

hard drive
Mobile workforce exposes businesses to security vulnerabilities

U.S. business leaders are unprepared for the increased threat to information security that comes with flexible office environments. A Shred-it study shows that leaders are not …

Tor browser
Tor Browser 6.0 released

The Tor Browser lets you use Tor on Windows, OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser …

sharing
Identity fears are holding back the sharing economy

Businesses operating in the sharing economy are being held back by consumer fears over trust in the identity of the other party in the transaction, according to a new report …

connection
Improving software security through a data-driven security model

The current software security models, policies, mechanisms, and means of assurance are a relic of the times when software began being developed, and have not evolved along …

Twitter paid out $322,420 in bug bounties

Researchers have proven that bug bounties are a cheaper way for discovering vulnerabilities than hiring full-time bug hunters would be and, in the last few years, many …

users
The future of Identity Management: Passwords and the cloud

Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance. With a surge in cybercrime, it’s no wonder that …

tumblr
65 million Tumblr users’ email addresses, passwords sold on dark web

Email addresses and hashed and salted passwords of 65 million Tumblr users are being sold online by “peace_of_mind,” aka “Peace”, the individual that …

criminal
Global profiles of the typical fraudster

Technology is an important tool to help companies fight fraud, but many are not succeeding in using data analytics as a primary tool for fraud detection. Meanwhile, fraudsters …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools