Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
eye
Week in review: Masking printers’ tracking dots, anti-privacy dark patterns, and WPA3

Here’s an overview of some of last week’s most interesting news and articles: How Facebook and Google nudge users to make anti-privacy choices Facebook, Google and …

bug
Vulnerability landscape evolution for common desktop applications

Flexera released Vulnerability Review 2018: Top Desktop Apps, part of the annual report series from Secunia Research. This new edition focuses on heavily used desktop …

biohazard
Cryptocurrency miners poised for continued growth

WatchGuard threat intelligence from Q1 2018 revealed that 98.8 percent of seemingly common Linux/Downloader malware variants were actually designed to deliver a popular …

privacy
Do you support employee digital monitoring programs?

Employers can implement effective cybersecurity that increases visibility, reduces insider threat risk, and that respects employees’ privacy while gaining their support, …

Office 365
Whitepaper: Managing users and authentication with on-premises Active Directory for O365

This whitepaper is no longer available. The move to Office 365 (O365) requires IT departments to make some tough decisions regarding how and where to manage users and …

person
Cybercriminals will gravitate to criminal activity that maximizes their profit

McAfee released its McAfee Labs Threats Report: June 2018, examining the growth and trends of new malware, ransomware, and other threats in Q1 2018. McAfee Labs saw on average …

Microsoft PowerShell
91% of critical incidents involve known, legitimate binaries like PowerShell

Opportunistic threat actors are leveraging trusted tools, like PowerShell, to retrieve and execute malicious code from remote sources. According to eSentire, 91% of endpoint …

bot
Mobile is the new frontier for malicious bots

Distil Networks analyzed over 100 million mobile devices on its networks. The findings suggest that sophisticated cybercriminals and bot operators now implement a new …

transformation
Data guides the new security perimeter

A recent Kaspersky Lab report finds data breaches now cost enterprises more than $1.2 million. The report also finds that the success of digital transformation projects are …

chess
Confidence wavers in face of evolving cybersecurity threats

Webroot found that businesses in the U.S., U.K. and Australia are taking cybersecurity seriously – with almost 100 percent of respondents conducting some form of employee …

Hand
How criminals abuse IDNs to conduct malicious activities

New research from Farsight Security examines the prevalence and distribution of IDN lookalike domain names, also called homographs, over a 12-month period with a focus on 466 …

vintage computer
IT chiefs keep obsolete systems running just to keep data accessible

89 per cent of IT decision makers in UK enterprises admit they are keeping old or legacy applications alive just to keep the historical data accessible, according to a new …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools