Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Google Allo messaging app offers end-to-end crypto, but not as default

On Wednesday, at its annual developer-focused conference, Google introduced two new cross-platform apps: Allo and Duo. Google Allo is a messaging app, and Duo is a video …

teslacrypt
The end of TeslaCrypt: Master decryption key released

The operators of TeslaCrypt ransomware have decided to close up shop and have published a master key that decrypts the files encrypted by the malware. They also wrote that the …

bitly
Bitly partners with Let’s Encrypt for HTTPS links

Bitly processes data associated with more than 12 billion clicks per month, leading to massive troves of intelligence. Now, they’re partnering with Let’s Encrypt …

Gmail
Google drops support for old crypto on Gmail, SMTP servers

In less than a month, Google will stop supporting SSLv3 and RC4 on its SMTP and Gmail’s web servers. The end of support is not unexpected, as the Internet giant announced the …

Apache Milagro
Milagro: A distributed cryptosystem for the cloud

A new open source project within the Apache Incubator aims to create an alternative to outdated and problematic monolithic trust hierarchies such as commercial certificate …

prison cell jail
Suspect refuses to decrypt hard drives, is detained indefinitely

A former Philadelphia Police Department sergeant suspected of possessing child pornography has spent seven months in a detention center without being charged of any particular …

key
Defend encrypted data from quantum computer threat

If an exotic quantum computer is invented that could break the codes we depend on to protect confidential electronic information, what will we do to maintain our security and …

Tor
Former Tor developer helped the FBI unmask Tor users

A developer who used to work at Tor Project is the mastermind behind “Torsploit” (aka “Cornhusker”), the malware that was used by the FBI in 2012 to …

encryption
PGP-encrypted comms network allegedly used by criminals shuts down

The Dutch police has announced on Tuesday that they have pulled a system of encrypted communications used by Dutch and possible foreign criminals off the air, and that they …

Opera hand
Opera browser’s VPN is just a proxy, here’s how it works

Yesterday, Opera announced they’ve added a free VPN client with unlimited data usage in the latest developer version of their browser. Sounds great, doesn’t it? …

lighter
TeslaCrypt: New versions and delivery methods, no decryption tool

TeslaCrypt ransomware was first spotted and analyzed in early 2015, and soon enough researchers created a decryption tool for it. The malware has since reached versions 4.0 …

ransomware
The many faces and tactics of Jigsaw crypto-ransomware

The Jigsaw crypto-ransomware got its name from the main bad guy from the popular horror movie franchise Saw, as its initial ransom note (either in English or Portuguese) shows …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools