Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Oppose PRISM-like programs today or lose you privacy tomorrow

I used to work for a telecommunication company. The government had access to call records, although the process for obtaining any information required manual requests and …

Reactions from the security community to the NSA spying scandal

Last week a whistleblower created quite the stir when he leaked documents about PRISM, a surveiilance program by the NSA. Below are comments on this scandal that Help Net …

NSA whistleblower reveals himself, world reacts

This last week has been the most eventful one in infosec history since I can remember. An (at the time unnamed) whistleblower has rocked the world by disclosing documents that …

Video with NSA whistleblower Edward Snowden

This video features an interview with Edward Snowden, the man behind the most significant intelligence leak in U.S. history. Copyright © 2013 Praxis Films / Laura Poitras.

Spyware sold to foreign governments aimed at U.S. woman critical of Turkish movement

A failed phishing attempt aimed at an unnamed woman openly critical of the G??len Movement has revealed that spyware created for lawful intercept purposes is being used for …

Chinese army announces drill to test its digitalized forces

The Chinese People’s Liberation Army (PLA) has announced it will be holding a military exercise in June, aimed at testing “new types of combat forces including …

U.S. weapons systems designs reportedly stolen by hackers

Hackers – more than likely Chinese – have stolen designs for two dozen U.S. weapons systems during a series of raids, a previously undisclosed section of a report …

APT1 is back, attacks many of the initial U.S. corporate targets

The APT1 hacker group is back to its old tricks, targeting a big number of organizations and businesses and, among them, many of those that they have previously breached, …

US DOJ accuses journalist of espionage

Last week’s revelation that the U.S. DOJ has successfully subpoenaed two months’ worth of telephone toll records for phones of AP journalist has created quite an …

Aurora attackers were looking for Google’s surveillance database

When in early 2010 Google shared with the public that they had been breached in what became known as the Aurora attacks, they said that the attackers got their hands on some …

Large cyber espionage emanating from India

Norman Shark uncovered a large and sophisticated cyber-attack infrastructure that appears to have originated from India. The attacks, conducted by private threat actors over a …

Pentagon report accuses China military of cyber espionage

The Pentagon has come out and said it: “China is using its computer network exploitation (CNE) capability to support intelligence collection against the U.S. diplomatic, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools