Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
The unstoppable rise of DDoS attacks

For the past three quarters, there has been a doubling in the number of DDoS attacks year over year, according to Akamai. And while attackers favored less powerful but longer …

Keep your site more secure with WordPress 4.3

WordPress 4.3, named Billie in honor of jazz singer Billie Holiday, is available for download or update in your WordPress dashboard.The new version enables you to keep your …

Mozilla is experimenting with improved Private Browsing

Mozilla Foundation is again aiming to boost the privacy of Firefox users, and is beginning to test a new, improved kind of Private Browsing.“All major browsers offer …

Does your mobile carrier track you online?

At least nine mobile carriers around the world are using “supercookies” to track users’ web browsing, a study by human rights organization Access has …

Researcher releases exploit for OS X 0-day that gives root access

Italian security researcher Luca Todesco has published PoC exploit code for a newly discovered zero-day privilege escalation flaw affecting OS X Yosemite (v10.10) and …

How to sabotage DDoS-for-hire services?

We all know the damage that DDoS-for-hire services can inflict on websites and organizations behind them.What is less known is that a simple move like making PayPal seize the …

IBM is betting big on open source in the enterprise

IBM launched LinuxONE, a new portfolio of hardware, software and services solutions, providing two distinct Linux systems for large enterprises and mid-size businesses.The …

Sound-Proof: Two-factor authentication without user interaction

Reaping all the benefits of two-factor authentication without suffering the inconvenience that is usually attached to the option is something that many users dream about …

Five points of failure in recovering from an attack

An over emphasis on defense is leaving the financial sector exposed to cyber attack. An increase in threat levels has seen the sector bolster defenses by focusing on detection …

Privileged accounts are still easy to compromise

A Thycotic survey of 201 Black Hat USA 2015 attendees found that a majority (75%) have not seen a fundamental change in the level of difficulty in compromising privileged …

BitTorrent clients can be made to participate in high-volume DoS attacks

A group of researchers have discovered a new type of DoS attack that can be pulled off by a single attacker exploiting weaknesses in the BitTorrent protocol family.The …

Google plugs Google Admin app sandbox bypass 0-day

After having had some trouble with fixing a sandbox bypass vulnerability in the Google Admin Android app, the Google Security team has finally released on Friday an update …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools