Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Competition to crack a virtual terrorist HDD, break into CCTV systems

Sophos is calling amateur security talent to turn sleuth and to investigate confiscated crime scene computer systems belonging to a cyber terrorist group as part of the latest …

Retailers warned of attacks using hard-to-spot PoS malware

Retailers, beware: cyber crooks are increasingly targeting remote desktop applications by brute-forcing passwords, and are using that access to plant hard-to-detect PoS …

CIA chief admits agency employees hacked Senate computers

CIA Director John Brennan has confirmed that five CIA employees have, indeed, “improperly accessed” computers of Senate staffers and the computer network that was …

Reactions to the Paddy Power data breach

Paddy Power is contacting 649,055 customers in relation to a data breach from 2010. The historical dataset contained individual customer’s name, username, address, email …

Microsoft releases EMET 5.0

Microsoft has released version 5.0 of its Enhanced Mitigation Experience Toolkit (EMET), a free utility that uses a number of security mitigation techniques to prevent the …

Top 10 Facebook scams

American singer and actress Taylor Swift has lost her scam mojo, as her fake sex tape spreading on Facebook was excluded from the top ten most successful scams, according to …

Do CISOs deserve a seat at the leadership table?

ThreatTrack Security published a survey study of C-level executives that underscores a hotly-debated topic in executive circles: what is the role of the CISO? “The …

Malicious USB device firmware the next big infection vector?

Researchers from German security consultancy SR Labs have created a whole new class of attacks that can compromise computer systems via ubiquitous and widely used …

Security contest rewards builders of secure systems

More often than not, computer security competitions come in the form of Capture The Flag (CTF) contests, and the emphasis is on breaking systems. This approach helps defenders …

BitTorrent’s decentralized chat app keeps content, metadata safe

BitTorrent, the company that develops the eponymous peer-to-peer protocol and two popular clients that use it, has announced the release of Bleep, an online communication …

PCI compliance contributes to false sense of security

Despite industry data to the contrary, a new Tripwire retail cybersecurity survey indicates that organizations that rely on PCI compliance as the core of their information …

PC gamers increasingly under attack

Many gamers either disable their security or remove it altogether, thereby sacrificing protection to maximize system performance and leaving themselves vulnerable to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools