Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Red Cross
Australian blood donors’ info found leaking from insecure server

Personal information of some 550,000 Australian blood donors has been sitting exposed on a web developer’s server and has been downloaded by a person who effectively …

Microsoft Windows
New code injection attack works on all Windows versions

Researchers from security outfit enSilo have uncovered a new code injection technique that can be leveraged against all Windows versions without triggering current security …

facepalm
Nearly half of consumers have been cybercrime victims

45% of consumers have been a victim of some form of cybercrime — with 65% choosing not to report the incident to authorities. Research also found that one in six of these …

fish phishing
Phishers are impersonating major UK banks on Twitter

Customers of UK banks are being targeted by phishers impersonating the banks’ customer support account on Twitter, Proofpoint warns. The phishers usually choose a …

IoT Solutions World Congress Barcelona 2016
Photos: IoT Solutions World Congress Barcelona 2016

This week, the world’s leading industrial Internet companies and experts gathered at the Fira de Barcelona for the IoT Solutions World Congress (IoTSWC) in order to showcase …

cloud
Rise in cloud adoption, confusion about managing complex cloud environments

Today’s enterprises are increasingly moving to the cloud to transform internal IT environments, but are struggling to manage the complexity, according to 451 Research and …

City
Smart city initiatives: Highly integrated and complex problems to solve

Every day, leaders of large cities grapple with knotty, complex problems like decaying public transportation infrastructures, aging utility lines, urban blight, neighborhoods …

Lock
New FCC privacy rules protect broadband users

The Federal Communications Commission today adopted rules that require broadband ISPs to protect the privacy of their customers. The rules ensure broadband customers have …

Icarus
Icarus takes control of drones by impersonating their operators

Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a …

Dyn
Dyn DDoS attack post-mortem: Users inadvertently helped

As StarHub, one of the three major telcos in Singapore, confirmed that they were the latest victim of “intentional and likely malicious distributed denial-of-service …

iPhone business
Malicious JPEGs can compromise your iPhone

A vulnerability in the iOS CoreGraphics component allows attackers to compromise iDevices by tricking victims into viewing a maliciously crafted JPEG file. The good news is …

blocks
Banks are building a real-time global payment network using blockchain technology

Nine out of 10 banking professionals surveyed at large US, European and Canadian commercial banks said their company is currently exploring the use of blockchain technology …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools