Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Cloud-based document security from SealPath

SealPath launched its cloud-based software solution for Professionals and Enterprise users. Using SealPath technology, documents containing sensitive business information are …

Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that …

BYOD access solution with biometrics

HID Global announced a solution for government agencies interested in securing iOS devices with access to sensitive data. The solution combines the ActivClient Mobile SDK for …

Whonix: Anonymous operating system

Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware …

One-click security within Microsoft Outlook

CertiVox launched an automatic, end-to-end encryption capability designed specifically to enable government, businesses and individuals to benefit from one-click security …

HSTS approved as proposed standard

The Internet Engineering Steering Group (IESG) has approved the HTTP Strict Transport Security protocol (HSTS) as a proposed standard, which means that we can look forward to …

NIST selects winner of SHA-3 competition

The National Institute of Standards and Technology (NIST) announced the winner of its five-year competition to select a new cryptographic hash algorithm, one of the …

New wireless APs and 2-factor authentication products from Fortinet

Fortinet announced four new wireless access points along with three new two-factor authentication products. Fortinet is introducing four new additions to its wireless access …

Pen-testing Cookie Cadger continues where Firesheep left off

When the Firesheep extension was revealed to the world in late 2010, its developer said that his main goal was to get sites to switch to full end-to-end encryption, i.e. SSL. …

Google Go programming language used for creating destructive Trojan

When Google introduced its Go programming language in 2009, they surely didn’t hope for it to be used for writing malware but, as these things go, it was a only a matter …

Botnet operators hide C&Cs in the Tor network

Over the years, botnet owners have tried out different tactics for keeping their C&C servers online, in contact with the zombie computers, and hidden from researchers and …

BEAST developers come up with new SSL/TLS attack

From the security researchers who created and demonstrated the BEAST (Browser Exploit Against SSL/TLS) tool for breaking SSL/TLS encryption comes another attack that exploits …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools