Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Can you correctly identify phishing emails?

An Intel Security quiz presented ten emails and asked respondents to identify which of the emails were phishing attempts designed to steal personal information and which were …

CIOs are distracted by the business of keeping the lights on

75 percent of CIO respondents to a global survey stated their network is an issue in achieving their organizations goals. For almost a quarter of CIO’s polled, it is a …

Former employee claims cybersecurity firm extorted clients

Tiversa, a privately held cybersecurity company based in Pittsburgh, Pennsylvania, has been accused by a former employee of hacking and then trying to effectively extort money …

US Passport Agency contractor stole applicants’ data to steal their identities

Three women from Houston, Texas, stand accused of engaging in an identity theft scheme in which one of them, a contract employee of the Department of State Passport Agency, …

Cyber extortionists are hitting hedge funds

Hedge funds are increasingly targeted by cyber extortionists, John Carlin, US Assistant Attorney General for National Security, has warned the audience at the SALT hedge fund …

Man charged with attempted spear-phishing attack on U.S. Department of Energy

An indictment is charging a former employee of the U.S. Department of Energy and the U.S. Nuclear Regulatory Commission (NRC) with a total of four felony offenses in …

Why WinSCP became an open source classic

If you’re a Windows user and you’re connecting securely to remote machines, you’ve probably heard about WinSCP. This multi-functional open source tool has …

Increasing cloud adoption will drive IT innovation

DevOps is a software development and IT management method that brings software engineering, quality assurance, and IT operations together as an integrated team to …

Angler EK pushes unnamed ransomware

“Malware distribution campaigns based using the popular Angler exploit kit continue delivering different types of ransomware. Last week, it was AlphaCrypt, which …

Tor Cloud project reaches the end of the line

The Tor Project has discontinued the Tor Cloud project due to a lack of dedicated software developers and maintainers.The Tor Cloud project was started in late 2011, with the …

Truth
Do you know where your sensitive data lives?

The majority of IT security professionals don’t have full visibility into where all their organization’s sensitive data resides, according to Perspecsys. Challenges with …

Flawed crypto endangers millions of smart grid devices

The cryptography used in the Open Smart Grid Protocol (OSGP), one of the most widely used smart meter and smart grid device networking standards, can be easily cracked, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools