Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
ATM
ATM attacks: How hackers are going for gold

Imagine winning the lottery and having an ATM spit huge amounts of cash at you. That’s exactly what some cyber criminals are after. They’re targeting ATMs and launching …

people
Do young people hold the key to closing the cybersecurity talent gap?

The cybersecurity talent shortage is a frequently talked about. Even with the attention, the future still holds more job openings than qualified employees available to fill …

keys
Mobile first: Security concerns and solutions

The majority of people – 83%, in fact – use their mobile devices to go online. 89% of these users connect to the internet via a mobile device every day. However, …

building
Build security into software up front: Believe it or not, it’s cheaper and faster

“You can pay me now, or you can pay me later” was the tagline of a 1981 ad promoting oil filters. Seems simple, but the implied message was much stronger: It wasn’t about …

mobile
Risky business: Are mobile employees compromising business info?

Americans logged 457.4 million trips for business in 2016, and there is no sign of business travel slowing down, with global business travel spend expected to rise 5.8 percent …

lights
Leveraging security analytics to investigate and hunt modern threats

In this interview, Gary Golomb, co-founder at Awake Security, talks about how machine learning help develop a scalable enterprise cybersecurity plan, what technologies can …

abstract
Are SMBs driving the adoption of security automation by enterprises?

If you tracked the lifecycle of new security technologies, you’d likely see that most start as enterprise solutions and eventually trickle down to small and medium-sized …

patch
May 2018 Patch Tuesday forecast: Where are the flowers?

The wintry weather doesn’t want to give up its hold on us here in the US. The extended cold has kept the spring flowers from blooming, dragging out the winter blues. It …

business
A smooth transition to the cloud is possible with identity governance

It comes as no surprise that organizations large and small are considering adopting the cloud as part of their overall IT strategy. The variety of impressive benefits that the …

cryptocurrency
Dig this: The future of crypto-mining botnets

The blockchain sector is now bursting with innovation, with developers looking for new, pragmatic ways to use this secure distributed ledger technology across a range of …

sharing
New DNS encryption tools accelerate privacy online

Brand new Domain Naming Service (DNS) Cloudflare is gaining firm ground among internet users. Unlike many other DNS providers, Cloudflare positions itself as a strictly …

architecture
Why good security foundations are better than the best security mitigation

Since founding VDOO, we have been working to analyze a great many IoT devices, in the broadest way possible. The more we look into these devices and find their …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools