Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Apple Face ID
The future of biometric modalities in consumer electronics

The battle for the future of biometric modalities in consumer electronics is expected to become fiercer with each passing year as face and iris recognition are continuously …

city
Smart cities: New threats and opportunities

As smart cities integrate connected technologies to operate more efficiently and improve the quality of city services, new vulnerabilities arise that require diligent …

editor
The percentage of open source code in proprietary apps is rising

The number of open source components in the codebase of proprietary applications keeps rising and with it the risk of those apps being compromised by attackers leveraging …

evil
Internet of Things: Who is watching you?

An overwhelming number of IT security professionals (85%) see a cyberattack on critical infrastructure happening in the next five years. Pwnie Express CEO Todd DeSisto says …

802 Secure
Relying on legacy security technologies leaves you blind to IoT threats

As shadow IoT infiltrate organizations, the variety of risks and threats stemming from these devices put networks and data at risk, according to 802 Secure. IoT and IIoT …

Internet of Things
How consumers are embracing IoT

A CSG survey, which polled more than 2,000 consumers between the ages of 18 and 64, evaluated consumer understanding, usage and sentiment about current and future IoT …

Network
Exposing the threat of shadow devices

Infoblox announced new research that exposes the significant threat posed by shadow devices on enterprise networks. Researchers found that enterprise networks across the US, …

Hand
Hacking for fun and profit: How one researcher is making IoT device makers take security seriously

We should all be so lucky to enjoy our work as much as Ken Munro does. Generally attracted by research that “looks fun” and particularly interested in probing the …

architecture
Why good security foundations are better than the best security mitigation

Since founding VDOO, we have been working to analyze a great many IoT devices, in the broadest way possible. The more we look into these devices and find their …

IoT
Effective intrusion detection for the Internet of Things

A group of researchers have devised a self-learning system for detecting compromised IoT devices that does not require prior knowledge about device types or labeled training …

hospital
Cybersecurity task force addresses medical device safety

In an effort to harmonize the work being done in hospitals and by device manufacturers to address medical device vulnerabilities, Vizient has formed the Medical Device …

Abstract
Real-time detection of consumer IoT devices participating in DDoS attacks

Could we detect compromised consumer IoT devices participating in a DDoS attack in real-time and do someting about it? A group of researchers Princeton University have …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools