Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Week in review: NSA records a country’s phone calls, SSL innovations, and (IN)SECURE Magazine special issue

Here’s an overview of some of last week’s most interesting news, podcasts, reviews, videos, interviews, and articles: US announces transition of oversight over …

NSA targets sys admins to breach computer networks

A newly analyzed document from Edward Snowden’s trove show that the NSA collects personal and account information on system administrators and uses it to compromise …

Bitcoin software update fixes transaction ID malleability bugs

Bitcoin Core – as the Bitcoin infrastructure software has been renamed to in order to avoid confusion with the the Bitcoin network – has been updated to make, …

Microsoft accessed Hotmail account to uncover internal leaker

This week’s charging of a former Microsoft employee for stealing the company’s trade secrets could have passed almost unnoticed were it not for an important detail …

IBM launches new software and consulting services

IBM introduced new software and services to help organizations use Big Data and Analytics to address the $3.5 trillion lost each year to fraud and financial crimes. Through …

Webcast: Beware of the Wild Wild Web

The World Wide Web is wasteland brimming with uncontrolled threats and dangers to IT security. Network and IT managers can prevent those threats from causing damage by …

BlackOS malicious web traffic managing software is on sale

Security researchers are keeping a close eye on underground cybercrime forums and are quick to spot new offerings, such as the BlackOS software package. Not to be confused …

US tech firms knew about and assisted with PRISM data collection

In a testimony before the Privacy and Civil Liberties Oversight Board, the NSA general council Rajesh De and his colleague stated on Wednesday that the tech companies that …

Over 31,000 IoT devices and computers infected by cryptocoin-mining worm

A new version of the Darlloz Linux worm, which targets Internet-enabled devices such as home routers and security cameras, computers running Intel x86 architectures as well as …

Oracle releases Java 8

Oracle has released Java Standard Edition (SE) 8, Java Development Kit (JDK) 8, and Java Runtime Environment (JRE) 8. The new releases work on Windows 8, Windows 7, Windows …

Product pitch: DigiCert Certificate Inspector

SSL Certificates serve as the security backbone of the internet, securing billions of interactions annually. Yet, too often, system administrators fail to properly configure …

Operation dismantles child exploitation enterprise on Tor network

DHS Secretary Jeh Johnson highlighted the complete results of one of the largest online child exploitation investigations in the history of ICE, involving victims in 39 states …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools