Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Circle eye
FBI subpoenaed Carnegie Mellon University for Tor-using suspect’s IP address

A court order in the case of U.S. vs Brian Farrell, a man charged with conspiracy to distribute illegal drugs while he was allegedly an administrator of the Silk Road 2.0 …

Match
Not all data breaches are created equal

1,673 data breaches led to 707 million data records being compromised worldwide during 2015, according to Gemalto’s Breach Level Index (BLI). The BLI is a global …

Nissan LEAF
Insecure APIs allow anyone to mess with Nissan LEAF electric car

A vulnerability in the mobile app used to interact with Nissan LEAF, a popular electric car, can be exploited by remote, unauthenticated attackers to switch the car’s AC …

keyboard
A third of IT managers admit to hacking

A high percentage of IT personnel admitted to not following the same security protocols they are expected to enforce, according to Absolute Software. Of those surveyed, 33% of …

Binary
Internet of Evil Things: The growing risks of connected devices

As risk and concern around connected Internet of Things (IoT) devices continues to grow, resources and visibility into such connected devices have stagnated despite the …

Cloud
8 in 10 IT pros believe believe their data is safer in the cloud

Eight in 10 IT professionals and executives believe that when facing hardware malfunctions and environmental disasters, their organization’s data is safer in the cloud …

OptioLabs OptioInsight
Correlate real-time data from mobile devices across the enterprise

OptioLabs announced the availability of OptioInsight for enterprises using OptioCore-secured devices. OptioInsight correlates real-time data from mobile devices across the …

Niara dashboard
Utilize any data source to see attacks on the inside

Niara, a provider of security analytics for attack detection and incident response, announced that the latest release of its security analytics platform analyzes any data …

Siemplify
Siemplify brings military intelligence capabilities to enterprise security operations

Transforming the way enterprises perform cyberthreat analysis, Siemplify emerged from stealth mode with the first security operations platform to employ the same cybersecurity …

VERA
Vera secures $17 million in series B financing

Vera, a top 10 finalist for the Innovation Sandbox competition at RSA Conference 2016, has closed $17 million in Series B financing, led by Sutter Hill Ventures, with …

healthcare
Hacking hospitals: Cyber attacks can result in physical harm

Independent Security Evaluators (ISE) published a study that demonstrates security flaws to be pervasive within the healthcare industry. The research found that adversaries …

ASUS
FTC forces Asus to improve router security

The Federal Trade Commission (FTC) is actively trying to make sure that companies secure the software and devices that they provide to consumers, and Tuesday’s …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools