Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Verify your software for security bugs

Verification is an important phase of developing secure software that is not always addressed in depth that includes dynamic analysis and fuzzing testing. This step allows …

The true cost of cybercrime

From a cybercrime perspective, the opportunities are boundless: Seemingly everything has a computer in it, cars and pacemakers included. It’s almost certain that the …

Secure cloud storage service MEGA releases iOS app

MEGA is a secure cloud storage service with 50 GB free storage space. The official MEGA iOS app is now available on the App Store. Features: Browse and manage your MEGA cloud …

Malware creation hits record-high numbers

PandaLabs has published the results of its Quarterly Report for Q3 2013. One of the main conclusions that can be drawn from this global study is that malware creation has hit …

How IT will transform business in 2014

Generally speaking, I’m not a big fan of predictions. I’ve never met anyone with a crystal ball that doesn’t work near a boardwalk or a table ensconced in …

Beware of online dangers lurking this Cyber Monday

Cyber Monday is often regarded as the beginning of the holiday shopping season, but many vendors are rolling out deals early as to entice online users to visit their web sites …

The rise of unsolicited and malicious emails

October saw spammers exploiting the themes of upcoming holidays, the names of well-known telecommunication service providers and the conflict in Syria, according to Kaspersky …

F-Secure launches KEY, a secure password manager

F-Secure Key safely stores your passwords, user names and other credentials so that you can access them wherever you are through one master password. Your personal data is …

BYOD is an applications strategy, not just a purchasing policy

Bring your own device (BYOD) is not just a purchasing policy and needs to be approached more broadly with the applications and strategies designed for today’s world, …

Overcoming the data privacy obstacle to cloud based test and development

How many times have data security and privacy constraints brought your key application development initiatives to a screeching halt? It usually occurs right around the time …

Cyber Monday security tips for businesses

Security experts at Neohapsis have put together the following tips to help keep businesses safe. 1. Use HTTPS – Remind employees to use HTTPS to make sure all data …

Documentary: Buying guns and drugs on the deep web

Motherboard used the deep web to find out just how easy it was to buy guns, drugs, and other contraband online. VICE Germany editor Tom Littlewood talks with cryptology …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools