Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
security camera
Unsecured security cameras lead to privacy erosion

The results of a recent analysis of some 6,000 open security cameras across the United States has shown that 15 percent of them are located in users’ private homes. Open …

ransomware
Most businesses would not pay in the event of a ransomware attack

Business owners in the U.S. recognize the severity of ransomware and the potential disruption to business operations, yet 84 percent say they would not pay in the event of a …

Rule 41
Changes to Rule 41 will increase law enforcement hacking, surveillance

The Electronic Frontier Foundation (EFF), the Tor Project, and dozens of other organizations are calling on citizens and website operators to take action to block a new rule …

building
Supporting the IT edge is expensive, full of potential security risks

Organizations are facing multiple challenges when managing the IT edge – at remote and branch offices. A Riverbed survey asked IT professionals about the various challenges …

SilentCircle Privacy Meter
Blackphone users get a virtual privacy assistant

Silent Circle has pushed out a new version of Silent OS, the operating system running on Blackphone 2 devices, and it comes with several privacy and security enhancements, …

LogMeIn
Poorly crafted LogMeIn password reset email looks phishy, but isn’t

LogMeIn has been sending out password reset emails to some of its customers, to prevent account hijacking fuelled by the recent spate of massive login credential leaks. …

biohazard
Malware families attacking business networks continue to grow

The number of active global malware families increased by 15 percent in May 2016, according to Check Point. They detected 2,300 unique and active malware families attacking …

bomb
Botnet-powered account takeover campaign hit unnamed bank

A single attacker has mounted two massive account takeover (ATO) campaigns against a financial institution and an entertainment company earlier this year, and used a gigantic …

Apple
There’s no virus in the iTunes database – it’s a phish!

A new phishing campaign aimed at Apple users has been spotted by security researcher Bryan Campbell. It takes the form of a fake email supposedly sent by Apple Service, …

anonymous
Tor Project tests new tool for foiling deanonymization attacks

Upcoming hardened releases of the Tor Browser will use a new technique aimed at preventing deanonymization efforts by anyone who might want to mount them. Created by a group …

Red Hat
Red Hat launches Ansible-native container workflow project

Red Hat launched Ansible Container under the Ansible project, which provides a simple, powerful, and agentless open source IT automation framework. Available now as a …

Windows 10
Bloatware-be-gone refresh tool added to Windows 10

In the latest test build of Windows 10 Anniversary Update released last week, Microsoft has introduced a tool that allows users to get rid of bloatware and crapware with one …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools