Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Simple Steps to Data Encryption

After last week's Practical Anonymity, here is another book by Peter Loshin that you might need in this new world of ours. It's a practical, hands-on guide about how to use …

Practical Anonymity: Hiding in Plain Sight Online

With the recent surveillance scandals tied to the NSA, you can no longer be deemed paranoid or believe yourself to be overreacting if you want to find a way of keeping your …

Black Code: Inside the Battle for Cyberspace

If anyone knows what's really going on in cyberspace and which forces threaten stability and security, it's Ronald Deibert and his colleagues from the well known and reputed …

Cloud Computing: Theory and Practice

Once a buzzword, cloud computing is now a part of nearly every modern IT infrastructure. Despite a variety of privacy, security and compliance concerns, companies large and …

Introduction to Cyber-Warfare

If you're looking to learn about cyber warfare, but don't know where to start, you might prefer picking up a book instead of searching for information dispersed on the …

Network Intrusion Analysis

What happens after a network intrusion is detected? What steps do you need to take? What is the proper way to react in a specific situation? The authors say their intention …

Information Security Risk Assessment Toolkit

It is a truth universally acknowledged that in order to know what company IT assets you should protect and how, you need to first perform a risk assessment. But how do to go …

Chat securely on Facebook with Synapsid

Synapsid is an iOS app that promises an encrypted chat experience on Facebook. In addition to having secure conversations, Synapsid allows you to: view friends profiles, …

Instant Apple Configurator How-to

Apple Configurator is a tool used for the mass configuration of iOS devices. With many large organizations adapting a variety of iOS devices into their daily workflow, it's …

Vulnerability scanning with PureCloud

nCircle PureCloud is a cloud-based network security scanning product built upon the companies' vulnerability and risk management system IP360.

Bad Data Handbook

The Bad Data Handbook is a collection of experiences of 19 different data scientists and experts, who share their methods of making data work for and not against them.

Online password management with my1login

In this day and age when everything moves from client computers to the cloud, a number of companies started providing online password management services. I recently attended …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools