Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Skull
Not all who pay a ransom successfully recover their compromised data

A new report by the CyberEdge Group found that 55 percent of responding organizations were compromised by ransomware in 2017, down from 61 percent in 2016. How victims …

Cisco
Cisco fixes critical flaw in its Secure Access Control System

Cisco has pushed out fixes for security vulnerabilities in a wide variety of its products, including two critical flaws in its Secure Access Control System (ACS) and its Prime …

Android P
Android P: Expected security and privacy improvements

Google has released a developer preview of the next version of Android, currently called “Android P.” Functional changes are many, but here’s an overview of …

UK
UK govt wants IoT manufacturers to take responsability for security

The UK government aims to shift the burden of securing IoT devices away from consumers and put the onus of securing them squarely on the manufacturers. “Poorly secured …

cloud
Cloud access management is integral to adopting cloud applications

The proliferation of cloud applications and use of a disparate range of devices within businesses has led to 64% of IT leaders admitting that their security teams are …

sharing
Intelligence sharing is crucial in the fight against cybercrime

Malware variants previously focused on the financial sector are now successfully attacking non-banking targets, according to Blueliv. A higher level of collaboration and …

cloud
The driving force of cloud security investments

A new Netwrix report supplements the 2018 Netwrix Cloud Security Report, unveiling survey findings specific to various industries and regions. Overall, 853 organizations …

PC
Locked Windows machines can be compromised through Cortana

Compromising locked Windows computers that have the Cortana voice-activated virtual assistant enabled is relatively easy – or it was until Microsoft made a simple tweak. …

email
Exim vulnerability opens 400,000 servers to remote code execution

If you’re using the Exim mail transfer agent on your Internet-connected Unix-like systems and you haven’t yet upgraded to version 4.90.1, now is the time to do it …

Phishing
Most top US higher ed institutions fail to protect students from phishing

88.8 percent of the root domains operated by top colleges and universities in the United States are putting their students, staff and other recipients at risk for phishing …

One
Cyber attacks becoming No. 1 business risk

SonicWall recorded 9.32 billion malware attacks in 2017 and saw more than 12,500 new Common Vulnerabilities and Exposures (CVE) reported for the year. “The cyber arms race …

earth
Global security trends for 2018: GDPR, identity and access security

In its third annual global IT security survey, Versasec found Europe’s General Data Protection Regulation (GDPR) is impacting security planning around the world, smart …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools