Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
If anything shouldn’t be taken for granted, it’s Information Security Management

It was one of our usual off-the-record discussions when I spoke with network admin and asked about the regular password change set up on the system. And, the answer included …

What to expect in the unpredictable world of IT security?

2014 has been particularly busy for IT security professionals. Many of the threats that we predicted at the start of the year duly emerged, while other significant issues …

Week in review: Regin spy malware, hacking RFID payment cards, and how to detect fraudulent activity in a cloud

Here’s an overview of some of last week’s most interesting news, interviews and articles: Fighting malware, emerging threats and AI Liran Tancman is the CEO of …

How to evaluate national cyber security strategies

ENISA issued an Evaluation Framework on National Cyber Security Strategies (NCSS) addressed to policy experts and government officials who design, implement and evaluate an …

Preparing for an information audit

A constant concern of many organizations is how to improve security or ensure that they meet audit needs. Though this is a top concern, they assume that any type of solution …

Most people don’t feel safe when shopping online

Most consumers do not feel safe when shopping online and many are shying away from their favorite retailers as a result, according to the NCC Group. According to the …

The rise of account takeovers

Account takeover fraud is the primary means of attack from fraudsters and attack origins occurring predominantly outside of the U.S., according to NuData Security. Account …

SaaS deployments are now mission critical

Global buyers of cloud applications cite cost, innovation and agility as reasons for adoption. In May and June 2014, Gartner conducted a survey across 10 countries in four …

Why you should protect your wireless connection

It’s holiday shopping season again, and consumers will join the rush to buy devices and accessories for loved ones. They’ll scoop up phones and tablets, plus …

ISO 27001: An overview of ISMS implementation process

Register for this webinar to learn: Family of ISO 27k standards – for what purpose should each standard be used 17 steps towards ISO 27001 certification Key benefits and …

Hacking RFID payment cards made possible with Android app

We recently encountered a high-risk Android app detected as ANDROIDOS_STIP.A in Chile. This app, found distributed through forums and blogs, can be used to hack into the …

Scammers used fake product listings to steal from Walmart

On November 13, US retailer Walmart announced that they will officially start matching the price for items which are also sold for a lower price by online retailers. Less than …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools