Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
general
Week in review: The life of a social engineer, and the end of TeslaCrypt

Here’s an overview of some of last week’s most interesting news and articles: The life of a social engineer: Hacking the human A clean-cut guy with rimmed glasses …

chain
Blockchain technologies: A key tool for data management?

Blockchain technologies (the technical foundation for Bitcoin) hold great potential to solve government’s long-term challenge of establishing clear rules about who has …

cyber resilience
Making the financial sector more resilient to cyber attack

Firms across the financial and related professional services industry need to take urgent action on cyber risk, according to a new report from TheCityUK and Marsh. There were …

World
The changing economics of the digital ecosystem

The GSMA published a new report examining the structure, economic drivers and financial performance of the global Internet economy and its respective segments. The research …

Search
You are what you click: Online search security risks

When it comes to the desire for the ideal body, people may be willing to sacrifice their online security if it takes them a step closer to achieving desired results, according …

Laptop
How developers fight the rise in web application attacks

Recent reports highlight the challenge faced by developers in securing code as attacks against web applications increase, while security budgets for developers remain low, …

bitly
Bitly partners with Let’s Encrypt for HTTPS links

Bitly processes data associated with more than 12 billion clicks per month, leading to massive troves of intelligence. Now, they’re partnering with Let’s Encrypt …

ATM
Criminals turn entire ATMs into skimmers

As if withdrawing money from an ATM wasn’t dangerous enough, researchers discovered that Russian-speaking Skimer group forces ATMs to assist them in stealing users’ …

dollar
Cybercrime economy: The business of hacking

The profile of typical cyber attackers – and the interconnected nature of their underground economy – have evolved in the last several years. Adversaries are …

users
Only two percent of IT experts consider third-party secure access a top priority

Soha Systems released a report based on a survey conducted by the newly formed Soha Third-Party Advisory Group, which consists of security and IT experts from Aberdeen Group, …

USA flag
The 3 biggest cybersecurity risks posed in the 2016 presidential election

Here’s a question for you: What do the four recent cyber attacks from the hacker group Anonymous have in common? Attack 1: On March 4, 2016, a group inside of Anonymous …

battery
Most organizations can’t protect digital information in the long-term

New research has revealed that the majority of organizations do not have a coherent long-term strategy for their vital digital information even though virtually all of them …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools