Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Penetration testing tool masquerades as surge protector

In the same way that a hardware keylogger may remain undetected by office workers, Power Pwn – a newly created piece of hardware resembling a power strip or surge …

Dropbox says there is no evidence of breach, continues investigating

Last week European Dropbox users began receiving spam emails advertising gambling websites, and given that many of them received it on unique email address created for the …

Fake Intuit emails lead to malware

Emails purportedly sent by US tax preparation software and services company Intuit and professional social network LinkedIn have been hitting inboxes in the last week, posing …

Open source smart meter hacking framework released

SecureState announced the release of the full open source code of Termineter, a framework that allows users to assess the security of Smart Meter utility meters over the …

Detecting mobile device vulnerabilities using Nessus

This video by Paul Asadoorian shows you how to enable and use the Nessus plugins which identify mobile devices and vulnerabilities from your MDM (Mobile Device Management) servers.

Free data masking download

Solix Technologies announced its EDMS Data Masking Standard Edition, a high performance data masking solution for PCI/PII compliance. Through a free download users are able …

iOS digital identity app WISeID 4.0 released

WISeKey lauched WISeID 4.0 for iOS. The digital identity app can create an accountable identity from its personal data organizer, which securely stores private details such as …

Good Technology enhances enterprise mobility solutions

Good Technology announced the addition of Good Dynamics AppKinetics to its Good Dynamics platform, which helps protect enterprise data in transit, at rest, and in use on …

Hadoop: The Definitive Guide, 3rd Edition

Ready to unlock the power of your data? With this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. …

Week in review: Grum botnet shutdown, Android malware, and Madi Trojan targeting the Middle East

Here’s an overview of some of last week’s most interesting news, articles and reviews: How to make smart grids To prepare for a successful roll-out of smart grids, …

Learning passwords you can use but not remember

How can you make sure that you’ll never share your password with anyone, even under threat of bodily harm, or other illegal and illegal type of coercion? The answer is …

Pinterest starts blocking hacked accounts, investigates

Pinterest spam and scams are nothing new. Spammers usually use newly created accounts to do it, and Pinterest scam toolkits have surfaced to help them in their efforts. But it …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools