Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
hole
Millions of smart devices in Spain are vulnerable to attack

Avast revealed the findings of its research experiment into smart devices, including public and private webcam vulnerabilities in Spain, and, specifically, in Barcelona. Avast …

Cybereason platform
Rewriting the rules on how to protect against evolving adversaries

Hackers are getting better at exploiting your organization’s increasingly complex IT environment. Adversaries are using highly customized attack campaigns to infiltrate …

mobile device
500,000+ devices have dangerous apps installed

At Mobile World Congress (MWC) 2017, connected cars, the future of smart homes and, of course, the newest handsets are top of the agenda. Intel Security’s latest findings show …

hole
Google releases details, PoC exploit code for IE, Edge flaw

As we’re impatiently waiting for Microsoft to patch vulnerabilities that were scheduled to be fixed in February, Google has released details about a serious …

MySQL
Cyber extortionists hold MySQL databases for ransom

Ransomware has become cyber crooks’ favorite attack methodology for hitting businesses, but not all cyber extortion attempts are effected with this particular type of …

Europe
The failure of EU’s regulation on cyber-surveillance tech exports

When in April 2016 the Italian Ministry of Economical Progress revoked Hacking Team’s licence to export their Galileo remote control software outside of the EU, it …

data
Not all threat intelligence is created equal

In this podcast recorded at RSA Conference 2017, John Czupak, CEO at ThreatQuotient, and Jonathan Couch, Senior VP of Strategy at ThreatQuotient, talk about what’s important …

connections
How IoT initiatives impact the IT infrastructure

Internet of Things (IoT) infrastructure spending is making inroads into enterprise IT budgets across a diverse set of industry verticals. Improved business offerings, IoT data …

Week in review: Mac ransomware, women in infosec, and the death of SHA-1

Here’s an overview of some of last week’s most interesting news, articles and podcasts: The dangers that come with buying pre-owned IoT devices When you buy a …

hand
Which countermeasures improve security and which are a waste of money?

If you want to know about which cyber defenses are most effective and which are a waste of money and resources, ask a hacker. And that’s just what Nuix researchers did. …

RES
New infosec products of the week​: February 24, 2017

Security solutions for IoT automotive telematics Building a secure automotive telematics platform to achieve a profitable business model for automakers and ecosystem partners …

connected
Biggest limiting factors to universal adoption of connected devices

After surveying 250 respondents at CES 2017, the Open Connectivity Foundation (OCF) concluded that more than 60 percent of respondents consider standardization and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools