Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
New book on implementing business continuity according to ISO 22301

“Becoming Resilient: The Definitive Guide to ISO 22301 Implementation” describes the process of implementing business continuity according to ISO 22301, an …

Will 2014 be the year of encryption?

Security experts at Unisys predicted that the coming year will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data …

Users more worried about hacking than tracking

Internet users are highly concerned about the theft of personal and financial information and believe strongly that the federal government should do more to protect them, …

BitTorrent introduces secure, serverless messaging system

Back in September, the company behind the BitTorrent P2P protocol and the BitTorrent and μTorrent file-sharing software announced that they have started working on …

ZeroAccess botnet down for good?

When Microsoft and various law enforcement agencies around the world disrupted the ZeroAccess botnet at the beginning of December, they did not expect to fully eliminate it. …

Netwrix makes password management free to small businesses

Netwrix announced the availability of Netwrix Password Manager as a completely free offering to businesses with up to 100 users. “According to Forrester research, …

Fake Adobe “licence key delivery” emails carry malware

A clever malware distribution campaign is currently doing rounds, taking the form of emails purportedly delivering licence keys for a number of Adobe’s software …

90-day spam campaign turns to Santa in December

Ninety days ago a substantial spam campaign focusing on dubious offers and fake prizes began, according to Commtouch. However since December 10, the campaign has been …

Federal agency cloud adoption increases 400%

Tripwire announced the results of a survey on cloud security technology trends in the federal government. The survey evaluated the attitudes of more than 100 federal …

Information security and compliance trends for the new year

Coalfire released its top five cybersecurity predictions for 2014. Rick Dakin, the company’s chief security strategist, consolidated an analysis from over 1,000 audits …

Bomb-threatening student caught because he used Tor on school Wi-Fi

20-year-old Harvard student Eldo Kim has been accused of sending fake bomb threats to Harvard University on Monday. What makes this case interesting is that he used the Tor …

MacBook webcam indicator light can be disabled to aid spying

Two researchers from Johns Hopkins University have proved, without a doubt, that it is possible to activate internal iSight webcams included in some legacy Apple machines …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools