Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Google
Google open sources vendor security review tool

Google has open sourced its Vendor Security Assessment Questionnaire (VSAQ) Framework with the hope that other companies and developers could use it to improve their vendor …

IoT
IoT adoption is driving the use of Platform as a Service

The widespread adoption of the Internet of Things (IoT) is driving platform as a service (PaaS) utilization. Gartner predicts that, by 2020, more than 50 percent of all new …

Anomali threat intelligence
Making sense of threat intelligence data in your IT environment

Threat intelligence data has been growing at an exponential rate of 39% a month. Enterprise customers are looking at around 30,000 events going into their SIEM every second. …

power system
Attackers will target U.S. power systems

A hack on the Ukrainian power grid in late 2015 “blacked out more than 225,000 people,” according to Claims Journal, which described this type of attack as a …

IRS
Phishers successfully tricking payroll pros into sharing employee data

In February, the US Internal Revenue Service (IRS) issued a warning about a 400 percent surge in tax related phishing and malware incidents. The alert said that the most …

mobile fingerprint hack
Hack a mobile phone’s fingerprint sensor in 15 minutes

Two researchers from Michigan State University’s biometrics group have devised a method for hacking mobile phone’s fingerprint authentication by using just a color …

WordPress
Popular WordPress plugin opens backdoor, steals user credentials

If you are one of the 10,000+ users of the Custom Content Type Manager (CCTM) WordPress plugin, consider your site to be compromised and proceed to clean your installation up, …

Business ideas
UK businesses fail at security awareness

UK organizations are putting their reputation, customer trust and competitive advantage at greater risk by failing to provide their staff with effective security awareness and …

Apple
OS X ransomware found bundled with legitimate software

Palo Alto researchers have discovered the first fully functional ransomware aimed at Mac users. The malware, dubbed KeRanger, has been found on Friday (March 4), bundled into …

Laptop
Password sharing habits prioritize convenience over security

A new survey by LastPass on the password sharing habits of UK consumers reveals they favour convenience over security when it comes to sharing passwords. 55 per cent of UK …

RSA Conference
My reflections after visiting RSA Conference 2016

RSA Conference has long been the place where security vendors announce new products and services, and industry trends are made. I was told by Centrify that recent breaches …

BorgBackup
BorgBackup: Deduplication with compression and authenticated encryption

BorgBackup is a deduplicating backup program that supports compression and authenticated encryption. The main goal of BorgBackup is to provide an efficient and secure way to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools