Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Do security flaws with life-threatening implications need alternative disclosure?

If security researchers get no response from manufacturers when disclosing vulnerabilities with life-threatening implications, the majority of IT security professionals (64%) …

How to avoid data breaches? Start by addressing human error

Small businesses in the UK are failing to train staff on how to correctly identify and dispose of confidential information which could lead to a costly data breach.A Shred-it …

Chinese fraudsters are hijacking and misusing Uber accounts

Uber accounts continue to be hijacked, this time by Chinese fraudsters. According to Motherboard, a number of users complained recently on Twitter that their accounts have …

Exabeam secures $25 million in Series B funding

Exabeam closed a $25 million financing round to further accelerate the company’s growth and continue updating its user behavior analytics (UBA) solution.Icon Ventures …

Oysters tablet comes preinstalled with Trojanized Android firmware

“Keeping your mobile device free of malware requires intentional care, but sometimes even that is not enough. As Dr. Web researchers recently pointed out, a device you …

Hilton, Trump hotel chains hit by PoS malware

“Payment card data of visitors of a number of Hilton and Trump hotels in the US have been compromised, and some of it is being already used by crooks to rack up …

Mobile ad network exploited to launch JavaScript-based DDoS attack

A type of DDoS attack that has until now been mostly theoretical has become reality: CloudFlare engineers have spotted a browser-based Layer 7 flood hitting one of its …

Yahoo open-sources Gryffin, a large scale web security scanning platform

Yahoo has open-sourced Gryffin, a scanning platform for web applications.The developers’ goal was to create a security scanner that will be able to both discover as much …

Leaked Hacking Team emails show Saudi Arabia wanted to buy the company

Emails stolen in the Hacking Team breach and leaked online by the still unknown attackers continue to be analyzed, and offer insight into the inner workings and controversial …

How organizations can increase trust and resilience

Gartner said organizations must invest in three risk disciplines to increase trust and resilience. Running a digital business presents business leaders with an increasing …

Silent Circle launches Blackphone 2, delivering business and personal privacy

Silent Circle has launched Blackphone 2 – its next-generation smartphone that delivers privacy and security. It provides full device encryption by default through harnessing …

Infographic: Devaluing data, fighting cybercrime

For any organization connected to the Internet, it is not a question of if but when their business will be under attack, according to a recent cybersecurity report from …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools