Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
First victims of the Stuxnet worm revealed

After analyzing more than 2,000 Stuxnet files collected over a two-year period, Kaspersky Lab can identify the first victims of the Stuxnet worm. After Stuxnet was discovered …

How cybercriminals scam consumers during the holiday season

McAfee announced its annual “12 Scams of the Holidays” list, which includes the most popular ways cybercriminals scam consumers during the holiday season as they …

Only 47% of IT pros are confident in their hardware configurations

Respondents of a new Tripwire survey were asked about the level of confidence they have in their application of foundational security controls, including hardware and software …

8 criteria to decide which ISO 27001 policies and procedures to write

If you’re just starting to implement ISO 27001 in your company, you’re probably in a dilemma as to how many documents you need to have, and whether to write …

New SDK for Raspberry Pi protects embedded software

Wibu-Systems is about to introduce a Raspberry Pi version of its CodeMeter software protection platform called Compute Module. A CodeMeter SDK for the Raspberry Pi will enable …

Vigilance and the Enterprise of Things

Most enterprises allow BYOD in their environment, with varying levels of supervision. Typically, these are tablets and smartphones but the number of other Internet of Things …

A holistic approach to protecting intellectual property

Protecting intellectual property (IP) is high priority for security professionals, but IP can be a vague term. What exactly is included under the umbrella of IP? And …

Darkhotel espionage campaign targets corporate executives traveling abroad

Kaspersky Lab researched the Darkhotel espionage campaign, which has lurked in the shadows for at least four years while stealing sensitive data from selected corporate …

Aligning risk analysis and IT security spending

IT security spending should be aligned with risk analysis results. Too frequently, though, this is not the case. Thought leaders in information security have been describing a …

Internet of Things to reach 30 billion devices in 2020

While most everyone agrees that the Internet of Things (IoT) is poised for explosive growth and represents boundless opportunities – billions of connected things driving …

Week in review: Unprecedented iOS, OS X malware, secure messaging tech, Silk Road 2 takedown

Here’s an overview of some of last week’s most interesting news, reviews and articles: Researchers audit the TextSecure encrypted messaging app A group of German …

Overcoming Big Data security obstacles

When it comes to security, Big Data can be the cause of many obstacles. As Big Data often contains enormous quantities of personally identifiable information, privacy becomes …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools