Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Metadata-hiding Dark Mail protocol soon to be reality

At the Hackers on Planet Earth X (HOPE X) conference held this weekend in New York, NSA whistleblower Edward Snowden called for hackers, coders and developers to “help …

EFF invites hackers to test, secure its Open Wireless Router

The Electronic Frontier Foundation (EFF) has released Open Wireless Router, an experimental alpha release of wireless router software that is meant to improve some and add new …

Funny Facebook video scam leaves unamusing Trojan

A new funny video spreading on Facebook leaves a not-so-hilarious Trojan in its wake on users’ computers, according to research by Bitdefender. The malware, believed to …

Unpatched OpenSSL holes found on Siemens ICSs

A number of Siemens industrial products have been found sporting four vulnerabilities in their OpenSSL implementation, which could lead to man-in-the-middle (MitM) attacks or …

TRUSTe launches new privacy assessments

TRUSTe expanded its Data Privacy Management Platform to include TRUSTed Assessments, a new privacy assessment solution which addresses the need for specialized tools to …

Week in review: Vulnerable web-based password managers, Mayhem malware, and Google’s Project Zero

Here’s an overview of some of last week’s most interesting news, interviews and articles: Endpoint security myths and why they persist In this interview, Roman …

Mayhem malware ropes Linux, UNIX servers into botnets

A new malware that researchers have dubbed Mayhem is being used to target Linux and Unix web servers and has so far compromised over 1,400 Linux and FreeBSD servers around the …

Fake Flash Player steals credit card information

A new trojan that’s after credit card details is targeting Android users, warn antivirus experts from Dr. Web. The malware is currently targeting Russian users, but it …

Government-grade malware used for ransomware attacks

It was only a matter of time until cyber criminals got their hands on a piece of government-made malware and repurposed it for their own criminal needs. Sentinel Labs …

40% of IT security teams keep executives in the dark

A new survey uncovered the communication challenges between IT security professionals and executives, a desire to overhaul current security systems and limited security …

Are endpoints the most vulnerable part of the network?

Only 39% of companies have advanced endpoint security protections in place even though 74% consider endpoints to be “most vulnerable” to a cyber-attack, and 76% …

Acunetix offers free network security scan

Acunetix is offering 10,000 free network security scans with Acunetix Online Vulnerability Scanner in a bid to make it easier for businesses to take control of their network …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools