Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Germany’s new cyber-security law aimed at securing critical infrastructure

German institutions and businesses that fall in the “critical infrastructure” category will have to implement new information security measures, as defined by the …

The most damaging ramifications of DDoS attacks

More than half of IT security professionals (52 percent) said loss of customer trust and confidence were the most damaging consequences of DDoS attacks for their businesses, …

CFOs are not confident about their level of security

CFOs’ long-term outlook for the North American economy remains strong despite their weakening confidence in their own companies’ prospects, according to Deloitte. Lower …

The soaring cost of malware containment

“Organizations are dealing with nearly 10,000 malware alerts per week, however, only 22% of these are considered reliable, according to a new report from The Ponemon …

More of Hacking Team’s capabilities and questionable actions revealed

The Hacking Team data leak has shown us with whom the company does business with, and their employees’ and management’s unguarded opinions about various …

Flawed Android backup mechanism can lead to injected malicious apps

A flaw (CVE-2014-7952) in Android’s backup/restore mechanism can be exploited by knowledgeable developers to “respawn” malicious apps on phones, and make …

First Java zero-day in two years exploited by Pawn Storm hackers

Another zero-day vulnerability is being exploited in attacks spotted in the wild: this time, the targeted software is Java.The flaw was spotted by Trend Micro researchers, who …

Identifying the five principal methods of network attacks

Companies are underestimating the risk of failing to provide security training to non-technical staff.A new Intel Security study, which surveyed IT decision makers in …

Two more Flash 0-day exploits found in Hacking Team leak, one already exploited in the wild

Exploits for two more Adobe Flash 0-days have been found in the leaked Hacking Team data. The existence of the vulnerabilities has been acknowledged by Adobe with a security …

Week in review: HackingTeam breach and consequences, and Android games unmasked as phishing tools

Here’s an overview of some of last week’s most interesting news and articles:Hacking Team hacked, 400GB+ of company documents and emails leakedHacking Team, the …

Apple to introduce two-factor authentication option in iOS 9 and OS X El Capitan

Starting with OS X 10.11 (“El Capitan”) and iOS 9, Apple will introduce a two-factor authentication option that will replace the current two-step verification …

VMware fixes host privilege escalation bug in Workstation, Player, Horizon View

VMware has issued software updates for VMware Workstation, Player, and Horizon View Client for Windows, which fix relatively serious a host privilege escalation vulnerability …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools