Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Nuclear facilities are wide open to cyber attacks

You would think that, given the potential disastrous consequences of a successful hack, the computer systems and networks of nuclear facilities would be better secured agains …

Millions affected by Scottrade brokerage breach that dates back two years

Missouri-based retail brokerage firm Scottrade has suffered a breach nearly two years ago, but they are only notifying their customers about it now, because they only found …

Car hacking via compromised car diagnostic tools

Car hacking is a topic that has received considerable attention from security researchers in the last year or so, and the general public and (hopefully) lawmakers are finally …

Is your board ready for a security incident?

Businesses suffered nearly 43 million known security incidents in 2014. This increased 48% compared with 2013 and equals some 117,000 attacks daily. And still, many boards and …

Prevention is the best cure for identity theft

In 2014, 85 percent of people took steps to prevent identity theft, according to ARAG, a provider of legal insurance. Checking credit reports, shredding documents with …

The changing role of the risk manager

71% of risk managers say their overall level of influence is greater now than it was three years ago according to a survey of 500 companies in EMEA conducted for ACE European …

Week in review: The evolution of the CISO, a simple Gatekeeper bypass, and Stagefright 2.0

Here’s an overview of some of last week’s most interesting news and articles:Leaked Hacking Team emails show Saudi Arabia wanted to buy the companyEmails stolen in …

Advertising malware affects non-jailbroken iOS devices

“YiSpecter is infecting iOS devices belonging to Chinese and Taiwanese users, and is the first piece of malware that successfully targets both jailbroken and …

Personal info of 15 million T-Mobile USA customers stolen in Experian breach

Personal information of some 15 million T-Mobile US customers and applicants has been stolen by hackers who managed to breach several Experian servers. The credit agency …

Exposing fraud behavior patterns associated with compromised identities

Timeliness of detection and diversity of data sources are critical factors in countering attempts to compromise consumer identities, according to ID:A Labs.Understanding fraud …

With unprotected keys and certificates, businesses lose customers

Unprotected and poorly managed keys and certificates result in a loss of customers, costly outages, failed audits, and security breaches, according to The Ponemon Institute …

Employee use of cloud services puts business data at risk

UK companies are placing themselves at risk of cyberattacks and data breaches as a result of rampant use of cloud storage services and unclear or non-existent corporate …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools