Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
phone call
Can smartphone thieves be identified in seconds?

Ben-Gurion University of the Negev (BGU) researchers have developed a technique that identifies a smartphone thief or intruder in under 14 seconds. “While most people …

AlienVault USM Anywhere
USM Anywhere simplifies security for organizations of all sizes

AlienVault announced the availability of USM Anywhere, an all-in-one Software-as-a-Service (SaaS) security monitoring platform designed to centralize threat detection, …

Absolute
Self-healing endpoint security as a foundation for visibility

When it comes to persistent cyber threats, a majority of companies have resigned themselves to the fact they will be or are already infiltrated by an unknown adversary. It is …

IoT
8.4 billion connected things will be in use worldwide in 2017

Gartner forecasts that 8.4 billion connected things will be in use worldwide in 2017, up 31 percent from 2016, and will reach 20.4 billion by 2020. Total spending on endpoints …

cables
It’s time to rethink using remote access VPNs for third-party access

No longer safely operating behind the traditional corporate perimeter, business productivity today depends on integrating external members of the extended enterprise into the …

eye
Global biometrics market revenue to reach $15.1 billion by 2025

The biometrics market has reached a tipping point. Driven largely by the confluence of organizations’ desires to better authenticate or identify users and users’ distaste for …

firefighters
Number of disclosed vulnerabilities reaches all time high in 2016

A new report shows 2016 broke the previous all-time record for the highest number of reported vulnerabilities. The 15,000 vulnerabilities cataloged during 2016 by Risk Based …

car swerving hacking
Don’t take your hands off the wheel

Let me tell you a story. It’s a story about my brother-in-law, whom, for the sake of decency, we’ll call Steve. Steve has a new car. He loves that new car. It’s great. Does …

certificate
Scale, frequency and causes of certificate-related outages

Certificate-related outages negatively impact the reliability and availability of vital systems and services, according to Venafi. “Certificates and keys are identity and …

abstract
Week in review: Windows DoS zero-day, uncloaking Tor Browser users

Here’s an overview of some of last week’s most interesting news and articles: Half of IT pros don’t know how to improve their security posture Mid-market …

hand
How to minimize the risk and impact of identity fraud

The number of identity fraud victims increased by sixteen percent (rising to 15.4 million U.S. consumers) in the last year, according to Javelin Strategy & Research. They …

Industry
Recommendations to help the security of ICS-SCADA systems

The use of long-range communication networks, and specially the Internet, has revolutionised ICS-SCADA systems and architectures. The use of network communication in these …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools