Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
University implies they helped FBI break Tor protection because of a subpoena

Carnegie Mellon University has finally issued a statement commenting on the recent accusations that their researchers have aided the FBI to unmask a subset of Tor users …

Secure messaging service Telegram blocks 78 ISIS-related channels

Telegram, the popular instant messaging service that offers end-to-end encryption, announced on Wednesday that they have “blocked 78 ISIS-related channels across 12 …

How fake users are impacting business through acts of fraud and theft

A new report by The Ponemon Institute highlights the average economic value of a company’s user base ($117M) and the financial and brand reputation damage that can be done if …

The worst data disasters from 2015

What’s stronger than a speeding locomotive and can survive the heat of a fire? Data. The device that contains that data is a different story. Each year, Kroll Ontrack – which …

Mass adoption of mobile payment services derailed by security, privacy concerns

Evaluating the mobile payment preferences of 1,217 consumers from the U.S., a new Research Now survey revealed that 17 percent of respondents who did not make holiday …

Mobile users continue to put personal and corporate data at risk

Blancco Technology Group surveyed over 1,400 mobile users in the United States, Canada, UK and Australia, and found that inadequate security precautions taken by mobile users …

The future of information security in the government

A new report from Intel Security and the Digital Government Security Forum (DGSF) looks at the fast changing digital world, which promises to transform how our government and …

A Jihadi Help Desk assists ISIS terrorists and sympathizers with encryption?

The recent Paris attacks by ISIS have become the perfect pretext for governments to resume their attack on encryption.Even though the New York Times pulled an article blaming …

Mainframe access
Inside the largely unexplored world of mainframe security

The security of mainframe computers – the so-called “big iron”, which is mainly used by large organizations for critical applications, bulk data and …

Cracks in the mobile ecosystem, Internet-connected devices

The interconnectivity of technology has led to a point where many devices are potentially vulnerable, and in the third quarter, the real world impacts of cyberattacks became …

Exploit kit activity up 75 percent

The creation of DNS infrastructure by cybercriminals to unleash exploit kits increased 75 percent in the third quarter of 2015 from the same period in 2014, according to …

Microsoft CEO Satya Nadella
Microsoft’s new security posture leads to baked-in security

More than ever, Microsoft wants its products to be the first choice for enterprises, organizations, and governments. And to do that, they embedded security in the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools