searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

secure communications

Get our top stories in your inbox

New users flock to ProtonMail in wake of Trump’s victory

November 14, 2016

Following Donald Trump’s victory in the latest US presidential election, many people begun to worry about the surveillance capabilities that will now effectively be left …

Signal Protocol’s crypto core has no major flaws, researchers find

November 9, 2016

A group of computer science and cryptography professors and doctoral students has effected a security analysis of the secure messaging Signal Protocol – specifically, of …

Signal users can now make their messages disappear

October 12, 2016

Open Whisper Systems’ Signal, the messaging app favoured by Edward Snowden and many other users who want and need to keep their communication safe and private, is now …

Facebook Messenger end-to-end encryption rolled out for all users

October 5, 2016

Facebook Messenger’s Secret Conversations feature, which allows end-to-end encryption of messages exchanged by two users that have enabled the option, has finally been …

How the EFF was pushed to rethink its Secure Messaging Scorecard

August 11, 2016

As good as the idea behind Electronic Frontier Foundation’s Secure Messaging Scorecard is, its initial version left much to be desired. The idea was to provide a …

Vuvuzela: An untraceable messaging system aimed at thwarting powerful adversaries

December 14, 2015

A group of scientists from the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) believe they have created an effective and scalable text-messaging system …

Posts navigation

1 2 3

Featured news

  • Malicious activities insiders perform in enterprise applications
  • The challenges and advantages of building behavior-based threat detection
  • Product showcase: Group-IB Unified Risk Platform
Detection, isolation, and negotiation: Improving your ransomware preparedness and response

What's new

Is the UK government prepared for its greatest threat?

Malicious activities insiders perform in enterprise applications

69% of employees need to deal with more security measures in a hybrid work environment

Week in review: ZuoRAT targeting SOHO routers, trends affecting your security strategy

Don't miss

Is the UK government prepared for its greatest threat?

Malicious activities insiders perform in enterprise applications

The challenges and advantages of building behavior-based threat detection

Product showcase: Group-IB Unified Risk Platform

Evaluating the use of encryption across the world’s top one million sites

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers
  • Is your organization ready for Internet Explorer retirement?
  • Attackers aren’t slowing down, here’s what researchers are seeing

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise