Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
The state of remote access security

At the end of 2013, HOB conducted a survey of more than 200 CIOs and CTOs in the U.S. The survey quantified the trends and challenges IT decision makers experience when …

The digital universe will reach 44 trillion gigabytes by 2020

A new EMC study reveals how the emergence of wireless technologies, smart products and software-defined businesses are playing a central role in catapulting the volume of the …

Universities now have access to cybersecurity education

(ISC)2 is making its educational resources, which are updated regularly by its members and industry luminaries, available to academia to help meet the global demand for more …

NSA subverted EU privacy laws, spied on human rights orgs

In a testimony delivered by video-link from Moscow, NSA whistleblower Edward Snowden has revealed to EU parliamentarians that the US NSA is actively spying on human rights …

Heartbleed bug: What regular users need to do

As the news of the existence of the Heartbleed bug in OpenSSL and the implications of its existence trickles down into mainstream media, users are trying to figure out what …

New IDS project spots anomalous system behavior

A team of researchers from Binghamton University have been working on a new intrusion detection approach based on monitoring the behavior of systems and spotting when it …

Whitehat hacker breaches UMD servers to jump-start security remediation

Daving Helkowski, a software architect/engineer working for software consultancy Canton Group, has made a serious mistake that has already cost him his job and might end up …

Breaches expose 552 million identities in 2013

After lurking in the shadows for the first ten months of 2013, cybercriminals unleashed the most damaging series of cyberattacks in history. Symantec’s Internet Security …

TCG releases TPM 2.0 specification for device security

The Trusted Computing Group (TCG) has announced the TPM (Trusted Platform Module) 2.0 library specification, which provides a technology response to the global need for a more …

Lie detection technology that accurately reads eye behavior

A company has discovered how to not just open the window to the soul via one’s eyes, but also accurately determine whether or not that soul is lying. For years, …

Demand for security and Big Data experts grows

A new survey by TEKsystems compares current market conditions to the state of spending, skills needs, and impact areas. The survey represents the views of 244 IT leaders …

Email management lacks innovation, businesses turn to cloud

SolarWinds released survey results highlighting the growing challenge organizations face managing email in an increasingly complex environment where BYOx, mobility and other …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools