Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Privacy
European court says workplace surveillance must not violate workers’ privacy

European companies must strike a fair balance between workplace surveillance and their employees’ right to privacy, the European Court of Human Rights (ECHR) has ruled. …

Hackers can turn Amazon Echo into a covert listening device

New research released by MWR InfoSecurity reveals how attackers can compromise the Amazon Echo and turn it into a covert listening device, without affecting its overall …

Android malware
Lippizan: Sophisticated, targeted spyware on Google Play

Google has discovered targeted spyware on Google Play that is likely the work of Equus Technologies, an Israeli cyber surveillance technology dealer. The malware, dubbed …

Thyssen-Bornemisza Museum
How a museum protects some of the world’s finest pieces of art

After an internal audit revealed the limitations of Thyssen-Bornemisza Museum’s existing (analog) camera surveillance system, as well as a server that has been installed …

Berlin
German law enforcement gets new hacking powers

On Thursday, the Bundestag has voted to accept a new amendment that will expand the German police’s hacking powers. The new amendment will allow them to use so-called …

UK flag
UK govt wants real-time communication surveillance powers, courtesy of telcos

A leaked draft of proposed regulations shows that the UK government is after greater communication surveillance powers, and that in order to get them, it will legally require …

Android malware
iOS spyware Pegasus has an equally capable Android counterpart

Mobile security firm Lookout and Google have revealed the existence of Chrysaor (aka Pegasus for Android), a powerful espionage app that is believed by both companies to be …

CIA Twitter
Twitter reactions to the WikiLeaks CIA data dump

Here are some interesting Twitter reactions regarding the WikiLeaks release of 8,761 documents and files they claim originate from an isolated, high-security network situated …

CIA
Leaked: Docs cataloguing CIA’s frightening hacking capabilities

WikiLeaks has released 8,761 documents and files they claim originate from the US Central Intelligence Agency (CIA) – more specifically, from an “isolated, …

brain
CloudPets connected toys can be turned into remote surveillance devices

The CloudPets data breach saga continues, as Spiral Toys finally reported the breach to the California Attorney General’s Office. As a reminder: Leaked data provided to …

Europe
The failure of EU’s regulation on cyber-surveillance tech exports

When in April 2016 the Italian Ministry of Economical Progress revoked Hacking Team’s licence to export their Galileo remote control software outside of the EU, it …

Eye
How IDF soldiers’ phones got turned into spying devices

For many months now, an unknown threat actor has been tricking servicemen in the Israel Defense Forces (IDF) into installing Android spyware. Israeli media says that the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools