Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
cloud
A closer look at data breach preparedness

While most organizations have a data breach preparedness plan in place, executives are not updating or practicing the plan regularly and lack confidence in its effectiveness, …

fish phishing
Vast phishing campaigns boost global criminal attack footprint

The Anti-Phishing Working Group (APWG) observed a record number of phishing attacks in the second quarter of 2016. APWG observed 466,065 unique phishing websites in Q2. This …

Yahoo
Yahoo security breach highlights the importance of personal protection

The recent breach at Yahoo has proved once again that, regardless of a company’s size and expertise, security is always an issue. In the wake of the incident which left …

IP EXPO 2016
Photos: IP EXPO Europe 2016

With six IT events under one roof, 300+ exhibitors and 300+ free to attend seminar sessions, IP EXPO Europe is taking place this week in London, UK. IP EXPO Europe now …

Hook Up Dating app
Database containing info of 1.5 million online daters found leaking

Sensitive personal information of some 1.5 million users of several dating/cheating websites and apps has been found to be accessible via the Internet. This information …

Yahoo
How to close your Yahoo account

In light of the recent massive Yahoo breach an the fact that Yahoo scanned incoming emails on behalf of US intelligence, many are opting to close their accounts to protect …

Yahoo! HQ
Yahoo scanned incoming emails on behalf of US intelligence

In 2015, Yahoo created custom software for covertly scanning their customers’ incoming emails, and deployed it on behalf of a US intelligence agency, Reuters reported on …

DDoS
53% of DDoS attacks result in additional compromise

DDoS attack volume has remained consistently high and these attacks cause real damage to organizations, according to Neustar. The global response also affirms the prevalent …

IoT security
Checklist: IoT security and privacy

The Online Trust Alliance (OTA) released the consumer IoT security and privacy checklist, which contains steps consumers can take to help increase the security, privacy and …

Facebook Messenger
Facebook Messenger end-to-end encryption rolled out for all users

Facebook Messenger’s Secret Conversations feature, which allows end-to-end encryption of messages exchanged by two users that have enabled the option, has finally been …

Old people
Why the older generation is an attractive target for cybercriminals

People aged 55 and over are behaving insecurely online and often become the victim of fraud, according to Kaspersky Lab and B2B International. The survey questioned 12,546 …

abstract
Big Data investments are up, but fewer organizations plan to invest

Big Data investments continue to rise but are showing signs of contracting, according to Gartner. Their survey revealed that 48 percent of companies have invested in Big Data …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools