Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
51% of consumers share passwords

Consumers are inadvertently leaving back doors open to attackers as they share log in details and sign up for automatic log on to mobile apps and services, according to new …

Coder tries shaming apps and site owners into using HTTPS

How can we force website owners and software developers to start using HTTPS? Coder Tony Webster believes shaming might be the right answer. To that point, he created a …

Reactions to the massive breach at Community Health Systems

Community Health Systems, a major group that operates 206 hospitals throughout the US, has suffered a massive data breach: personal information of some 4.5 million patients …

Successful strategies to avoid frequent password changes

1.2 billion passwords reportedly stolen by Russian hackers. Before that it was Heartbleed. After a widespread, nonspecific data breach, the conventional wisdom is that people …

New ransomware emulates CryptoLocker, CryptoWall

Ransomware has proven to be such a successful money-making model, that a new variant is discovered or a new delivery campaign is spotted nearly every day. Security experts …

Infographic: Major security skills shortages

Cyber attacks are getting more advanced and hackers are getting smarter, yet businesses are facing major security skills shortages. The cost of breaches is thought to have …

Personal info of 4.5 million patients stolen in US hospital group breach

Community Health Systems, a major group that operates 206 hospitals throughout the US, has suffered a massive data breach: personal information of some 4.5 million patients …

Research unveils improved method to let computers know you are human

CAPTCHA services that require users to recognize and type in static distorted characters may be a method of the past, according to studies published by researchers at the …

Gyroscopes on Android devices can be used to eavesdrop on users’ conversations

If you think that denying an app permission to use your phone’s microphone is enough to prevent it from listening in on your conversations, think again, as a group of …

Android ransomware masquerades as Symantec mobile AV

A new piece of Android ransomware is doing rounds, and is tricking users into installing it by posing as a legitimate AV app. The malware sports a logo similar to that of …

ReversingLabs extracts malicious files from network traffic

ReversingLabs announced the N1000 Network File Threat Sensor appliance that employs Active Decomposition and Predictive Detection technologies to detect threats in files …

Whitepaper: Social networking and security risks

The popularity of social networking sites has increased at astonishing levels. There is no arguing the usefulness of sites such as Facebook, Twitter and LinkedIn. They can be …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools