Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
road
Map a path through the issues of cloud, security, data analytics

2016 will be a difficult year to call for the European IT businesses – any of the usual linear progress in the IT industry in 2015 as a result of more powerful technologies …

DDoS protection service: Top vendors in the field

Distributed denial of service (DDoS) attacks have in the past been viewed mostly as a tool of online protest due to Anonymous’ obvious predilection for this service …

Week in review: ScreenOS backdoor, Twitter warns about state-sponsored attacks, and MacKeeper data breach

Here’s an overview of some of last week’s most interesting news and articles: Critical ScreenOS bugs allow undetectable decryption of VPN connections, device …

Microsoft logo
Microsoft will stop trusting certificates from 20 Certificate Authorities

Starting on January 2016, Microsoft’s Trusted Root Certificate Program will no longer include twenty currently trusted CAs and will remove their root certificates …

match fire
Critical ScreenOS bugs allow undetectable decryption of VPN connections, device hijacking

Juniper Networks has discovered and patched a critical, high-impact vulnerability affecting ScreenOS on its NetScreen devices, and is advising customers to update their …

Washington state sues iYogi tech support firm for scamming users

Washington State Attorney General Bob Ferguson announced a lawsuit against one of the biggest independent tech support providers in the world, iYogi, and its President, Vishal …

encryption
Human error reduces security offered by encryption apps

Crypto phones – whether they are hardware devices or mobile apps – are a great way to assure that your VoIP communications remain private, but the security and …

Binary
Infosec pros are moving beyond traditional passwords

Businesses nationwide are increasing their cybersecurity budgets and exploring alternative authentication techniques to passwords, according to a SecureAuth and Wakefield …

Healthcare
Stolen medical information affects 18 out of 20 industries

Stolen medical information is a much more widespread issue than previously thought, affecting 18 out of 20 industries examined, according to the just released Verizon 2015 …

Euro
Mobile banking threats among the leading malicious financial programs

For the first time ever, mobile financial threats rank among the top ten malicious programs designed to steal money. Another alarming trend is the rapid spread of ransomware, …

binary
Five key cybersecurity trends for 2016

The overwhelming shift to mobile and cloud computing among both businesses and consumers will see some surprising additions to the risk landscape in 2016. ISACA shares five …

EU flag
New EU rules on data protection put the citizen back in the driving seat

New EU data protection legislation, informally agreed on Tuesday and backed by Civil Liberties MEPs on Thursday morning, will create a uniform set of rules across the EU fit …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools