Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Lock
The probability that an EV SSL certificate is associated with a bad domain is 0.013%

In 2018, phishing attacks were attempted 482.5 million times, more than doubling the number of incidents in 2017. New research conducted by the Georgia Institute of Technology …

brain
Companies struggle with the slow, unpredictable nature of AI projects

Despite significant investment in AI, many companies are still struggling to stabilize and scale their AI initiatives, according to Dotscience. While 63.2% of businesses …

Apple connection
AWDL flaws open Apple users to tracking, MitM, malware planting

Vulnerabilities in Apple Wireless Direct Link (AWDL), the wireless protocol that underpins Apple’s AirPlay and AirDrop services, could allow attackers to track users in …

chess
Solving security problems: Security advice for those with limited resources

In this interview, Mark Sangster, VP & Industry Security Strategist at eSentire, gives SMBs advice on how to minimize the risk of a data breach through better security …

cloud
Orchestrating security policies across your hybrid cloud with intelligent data virtualization

The proliferation of data is causing a security and governance challenge across the hybrid cloud. Estimates project the global datasphere will grow from 33 zettabytes in 2018 …

Tools
53% of enterprises have no idea if their security tools are working

The majority of organizations don’t know if the security tools they deploy are working, and are not confident they can avoid data breaches, according to AttackIQ. AttackIQ …

Phishing
Assessing the efficiency of phishing filters employed by email service providers

Technology companies could be doing much more to protect individuals and organizations from the threats posed by phishing, according to research by the University of Plymouth. …

contactless payment
Flaws allow attackers to bypass payment limits on Visa contactless cards

Flaws that allow attackers to bypass the payment limits on Visa contactless cards have been discovered by researchers Leigh-Anne Galloway and Tim Yunusov at Positive …

Twitter
While cybercriminals abuse Twitter, threat researchers use it to boost threat intelligence efforts

Cybercriminals are abusing Twitter via tech support scams, command-and-control (C&C) operations and data exfiltration, according to Trend Micro. Misuse of social networks …

light
Whitepaper: Building a Threat Intelligence Programme (UK)

ThreatConnect surveyed more than 350 cybersecurity decision makers in the UK. The result: Building a Threat Intelligence Programme discusses research findings on best …

CapitalOne
Capital One breach: Info on 106 million customers compromised, hacker arrested

Capital One, one of the largest banks in the United States by assets, has announced that it has suffered a massive data breach affecting the personal and financial information …

secure
How to secure your data as you go digital

To scale more efficiently and serve customers better, companies are moving more workloads and services to the cloud. According to IDG, 37 percent of companies are increasing …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools