Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Pirate activist shows politicians what digital surveillance looks like

How to make politicians really understand the dangers of mass digital surveillance and the importance of information security? Gustav Nipe, the 26-year old president of the …

Open source tool trawls Github repositories for sensitive data

Michael Henriksen, a member of the SoundCloud security team, has been recently tasked with creating a system that will constantly check the company’s GitHub …

WhatsApp sees increasing complexity of spam campaigns

Over the past few months, AdaptiveMobile has tracked an increase of spam complexity on messaging apps, such as WhatsApp, in the United States, Europe and India, and expects …

Encrypted messaging and file storage app Peerio goes open beta

Canada-base Peerio has released the beta version of an app of the same name which combines secure messaging, file sharing and storage, and adds encryption to it. Peerio is …

Five key security, identity and access management trends

CA Technologies announced five key trends for security and identity and access management (IAM) that will impact organizations and security professionals in 2015 as they …

Unlock your digital world with True Key

Intel Security recently previewed True Key, a new way to unlock your digital world. It combines both password management with simple and secure multi-factor …

New version of Cryptowall ransomware spotted doing rounds

The infamous Cryptowall ransomware is back: the newest version has been spotted compromising users starting on January 12. According to both Microsoft and the researcher that …

Beware of malware masquerading as Oracle security patches

Oracle is warning users about malware sites actively offering Oracle patches for download. “It has come to our attention that there are non-Oracle sites offering Oracle …

Skeleton Key malware makes all passwords valid

Researchers from the Dell Secureworks CTU team have unearthed a new type of malware whose goal is to allow attackers to bypass authentication on Active Directory (AD) systems …

Reactions to David Cameron’s plan to ban end-to-end encryption

On Tuesday, British Prime Minister David Cameron announced his plan to introduce new surveillance powers in the UK, and ban applications that use end-to-end encryption. Here …

January’s Patch Tuesday marks the start of a new era

Microsoft’s January 2015 patch Tuesday marks the start of a new era. It seems that Microsoft’s trend towards openness in security has reversed and the company that …

Cyber attacks demonstrated on autonomous ground vehicles

Mission Secure Inc. (MSi), a cyber defense technology and solutions provider, and Perrone Robotics Inc. (PRI), a provider of robotic and autonomous ground vehicle solutions, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools