Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Microsoft Exchange
Researchers discover highly stealthy Microsoft Exchange backdoor

An extremely stealthy Microsoft Exchange backdoor can read, modify or block emails going through the compromised mail server and even compose and send new emails. LightNeuron …

Europe
Bad actors increasingly spreading misinformation via social media ahead of EU elections

Bad actors are amplifying misinformation content directed at EU member states to shape public perception, a report by SafeGuard Cyber reveals. The report provides evidence and …

chip
Unhackable? New chip makes the computer an unsolvable puzzle

A new computer processor architecture that could usher in a future where computers proactively defend against threats, rendering the current electronic security model of bugs …

money
C-Suite execs and policy makers find cybersecurity technology investments essential

The majority of C-Suite executives and policy makers in the United States believe investing in security software, infrastructure and emerging technologies is critical to …

IoT
Flaws in the design of IoT devices prevent them from notifying homeowners about problems

Design flaws in smart home Internet of Things (IoT) devices that allow third parties to prevent devices from sharing information have been identified by researchers at North …

encryption
Cryptographic breakthrough allows using handshake-style encryption for time-delayed communications

When spies meet, they use secret handshakes to confirm their identities, ensuring they are who they say they are. Now, researchers at Stevens Institute of Technology, and …

Market
Network as a Service market to exceed $50bn by 2025

The Network as a Service market is poised to rise from $5 billion in 2018 to over $50 billion by 2025, according to a 2019 Global Market Insights report. Market growth drivers …

email
What will phishers do once push-based MFA becomes widely used?

As phishing continues to be the number one method for initiating a breach, investing in anti-phishing technologies or training – preferably both – should be a …

Dell laptop
Flaw in pre-installed software opens Dell computers to remote hijack

Dell computer owners should update the Dell SupportAssist software as soon as possible to close a high-risk remote code execution vulnerability. What is Dell SupportAssist? …

keys
PSD2 and strong customer authentication: Are all elements equal?

The European Payment Services Directive 2 (PSD2), introduced in January 2018, contains the requirement for additional security features for certain online transactions. These …

magnify
Researchers working on tools that aim to eliminate computer bugs

It’s bad enough losing an hour’s work when your computer crashes – but in settings like healthcare and aviation, software glitches can have far more serious consequences. In …

containers
What differentiates the strongest cybersecurity programs from the rest

Financial institutions spend an average of around $2,300 per full-time employee on cybersecurity annually, reveals a survey released by Deloitte and the Financial Services …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools