Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Effective incident response

Organizations are bombarded with potential threats every day. Most of these are small and irritating, not truly critical – but among those needles are little threads of …

Cyber risks awaiting visitors and viewers of Sochi 2014 Olympics

The 2014 Winter Olympics are set to start on Friday in Sochi, a Russian city located on the shores of the Black Sea. There have been many controversies regarding this choice …

Five lessons we can learn from financial services and compliance

Banks and financial services organisations have been a prime target for hackers for a very long time, and as a result of this the industry has had to adhere to security …

A solution for fixing hijacked Chrome settings

Many users – if not all – have experienced downloading a free screensaver or game without looking at the small print and consequently getting their browser …

How a fake antivirus attack works

Earlier this month, Invincea researchers have warned about visitors of video-sharing website Dailymotion being targeted with malicious ads leading to bogus infection warnings …

Defending against drive-by downloads

In case you haven’t heard the term before, a drive-by download (DbD) is a class of cyber attack where you visit a booby-trapped web site and it automatically, and …

Why governance and policy can strengthen compliance efforts

A colleague of mine recently made a joke and it made me pause to think. During our discussion on compliance and how internal policy can help organizations comply with external …

How to recover deleted or corrupted digital currency

The popularity of Bitcoin and other digital / cryptographic currency cannot be denied. Different users like using it for different reasons, but many agree that the question of …

Smartphone spying: How can users protect themselves?

Smartphone users need to realise that their mobile phone is less of a phone and more of a mobile computer, in which applications can collect data from other applications …

Who should be responsible for protecting your online privacy?

Just in time for Data Privacy Day, Microsoft has released the results of a survey that shows the privacy attitudes of technology savvy individuals in the US and four European …

DDoS attacks become smarter, faster and more severe

DDoS attacks will continue to be a serious issue in 2014 – as attackers become more agile and their tools become more sophisticated, according to Radware. Their report …

Improving trust in web services

The EU’s cyber security Agency, ENISA, is publishing a series of new studies about the current security practices of Trust Service Providers (TSPs) and recommendations …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools