Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
encryption
Cryptographic breakthrough allows using handshake-style encryption for time-delayed communications

When spies meet, they use secret handshakes to confirm their identities, ensuring they are who they say they are. Now, researchers at Stevens Institute of Technology, and …

Market
Network as a Service market to exceed $50bn by 2025

The Network as a Service market is poised to rise from $5 billion in 2018 to over $50 billion by 2025, according to a 2019 Global Market Insights report. Market growth drivers …

email
What will phishers do once push-based MFA becomes widely used?

As phishing continues to be the number one method for initiating a breach, investing in anti-phishing technologies or training – preferably both – should be a …

Dell laptop
Flaw in pre-installed software opens Dell computers to remote hijack

Dell computer owners should update the Dell SupportAssist software as soon as possible to close a high-risk remote code execution vulnerability. What is Dell SupportAssist? …

keys
PSD2 and strong customer authentication: Are all elements equal?

The European Payment Services Directive 2 (PSD2), introduced in January 2018, contains the requirement for additional security features for certain online transactions. These …

magnify
Researchers working on tools that aim to eliminate computer bugs

It’s bad enough losing an hour’s work when your computer crashes – but in settings like healthcare and aviation, software glitches can have far more serious consequences. In …

containers
What differentiates the strongest cybersecurity programs from the rest

Financial institutions spend an average of around $2,300 per full-time employee on cybersecurity annually, reveals a survey released by Deloitte and the Financial Services …

binary
Trust is at a tipping point: Consumers will react strongly if they feel their privacy is compromised

There’s a stunning lack of consumer trust in the ability of private and public sector organizations to protect their data, as well as sharply conflicting views between …

architecture
Government embracing digital transformation but struggling to implement data security

The push towards digital transformation in the U.S. government is putting sensitive data at risk, according to a Thales research conducted by analyst firm IDC. The 2019 Thales …

alert
Week in review: Docker Hub breach, identifying malware in embedded systems, CCPA implementation

Here’s an overview of some of last week’s most interesting news and articles: Mozilla will block Firefox add-ons that contain obfuscated code Mozilla has announced that, …

reload
New infosec products of the week: May 3, 2019

Trustwave unveils new database security scanning and testing software Trustwave unveiled Trustwave DbProtect, new database security scanning and testing software that helps …

Firefox
Mozilla will block Firefox add-ons that contain obfuscated code

Mozilla has announced that, starting from June 10, Firefox add-ons containing obfuscated code will no longer be allowed on its Add-ons portal and will be blocked. “We …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools