Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Money
Worldwide IT spending outlook for 2016

Worldwide IT spending is forecast to total $3.54 trillion dollars in 2016, just a 0.6 percent increase over 2015 spending of $3.52 trillion dollars, according to Gartner, Inc. …

LastPass
LostPass: A worryingly simple phishing attack aimed at LastPass users

Security researcher (and Praesido CTO) Sean Cassidy has demonstrated at ShmooCon how easy it can be for hackers to steal LastPass users’ email, password, and two-factor …

justice sentence gavel law court
Casino operator sues Trustwave for failing to spot and stop hackers

Nevada-based Affinity Gaming, which operates five casinos in that state and 11 altogether in the US, is suing infosec outfit Trustwave, claiming that the company did a poor …

Internet
Unexpected implications arising from the Internet of Things

More than half of major new business processes and systems will incorporate some element of the Internet of Things (IoT) by 2020, according to Gartner. The impact of the IoT …

Week in review: The danger of terror attacks using drones, cheap web cams as permanent backdoors into networks

Here’s an overview of some of last week’s most interesting news and articles: Wi-Fi and security are better together for SMBs As a small to midsized business …

OS X Gatekeeper
OS X’s Gatekeeper bypassed again

Do you remember when, last October, Synack director of research Patrick Wardle found a simple way to evade OS X’s Gatekeeper defense mechanism by bundling up a …

Hyatt
250 Hyatt hotels around the world hit with PoS malware

In late December, the Hyatt Hotels Corporation announced that they found malware on computers that operate the payment processing systems for Hyatt-managed locations, but …

Library
Success of the Internet of Things depends on privacy and security

Even as the Internet of Things (IoT) creates new usages, systems and ways to manage and store data, there is a parallel need for impermeable privacy policies and protection …

OpenSSH
Flaw allows malicious OpenSSH servers to steal users’ private SSH keys

Qualys researchers have discovered two vulnerabilities in the popular OpenSSH implementation of the secure shell protocol, one of which (CVE-2016-0777) could be exploited by …

password
Compromised credentials a leading concern for most security pros

90% of organizations are worried about compromised credentials, though 60% say they cannot catch these types of attacks today, according to a new survey by Rapid7. 62% of …

business
Key principles for corporate digital responsibility

Businesses’ use of personal data from consumers is at risk and recommends key strategies and principles to properly protect consumer data, build trust and simultaneously grow …

justice sentence gavel law court
Why the legal sector is risking confidential information

The lack of unique logins, manual logoffs and concurrent logins is putting confidential information in the legal sector at risk, new research has revealed. A report by IS …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools