Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
ship
Vulnerable controllers could allow attackers to manipulate marine diesel engines

Researchers have found several authentication and encryption vulnerabilities in the firmware of marine diesel engine controllers by Norwegian company Auto-Maskin, as well as …

bomb
IIS attacks surge from 2,000 to 1.7 million over last quarter

IIS, Drupal, and Oracle WebLogic web technologies experienced increased attacks in Q2 2018. According to a new threat report from eSentire, IIS attacks showed a massive …

stats
Global spending on security solutions to reach $133.7 billion in 2022

Worldwide spending on security-related hardware, software, and services is forecast to reach $133.7 billion in 2022, according to IDC. Although spending growth is expected to …

Intra
Jigsaw releases Intra, an Android app that encrypts DNS queries to thwart online censorship

Alphabet subsidiary and tech incubator Jigsaw, which concentrates on creating solutions for “the toughest geopolitical challenges,” has released Intra, an Android …

open source
Downloads of known vulnerable open source components increase 120%

Sonatype today released its fourth annual State of the Software Supply Chain Report, which reveals the widespread use of vulnerable software components by businesses around …

Tor browser
Tor Browser 8 is out: What’s new?

Version 8 of Tor Browser, the multiplatform browser that routes traffic through the Tor anonymity network, has been released this week. About the Tor Browser and this latest …

Qualys CertView
Qualys Community Edition: Discover IT assets, manage vulnerabilities, scan web apps

In this podcast recorded at Black Hat USA 2018, Anthony Mogannam, Product Manager, SME/SMB Solutions at Qualys, talks about issues related to open source software and Qualys …

Google Chrome
Chrome 69 is out, includes many functional and security changes

Ten years ago Google released the first iteration of its Chrome browser. On Tuesday, the company pushed out version 69. It comes with a number of design and functional …

magnify
Social Mapper: A free tool for automated discovery of targets’ social media accounts

Trustwave has released Social Mapper, an open source tool that automates the process of discovering individuals’ social media accounts. How Social Mapper works The tool …

Google Chrome
Chrome users get Site Isolation by default to ward off Spectre attacks

Site Isolation, the optional security feature added to Chrome 63 late last year to serve as protection against Spectre information disclosure attacks, has been enabled by …

Gargoyle
Gargoyle: Innovative solution for preventing insider attacks

A group of researchers from UNSW Sydney, Macquarie University, and Purdue University has released a paper on a new and very promising network-based solution for preventing …

Android
Android devices with pre-installed malware sold in developing markets

New low-end Android smartphone devices being sold to consumers in developing markets, many of whom are coming online for the first time, contain pre-installed malware, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools