Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Why hire a hacker?

I’m not advocating the hiring of computer criminals. If you are being held to ransom by someone claiming to have control of your infrastructure, and demanding payment to …

The threat landscape continues to expand rapidly

ThreatMetrix announced cybersecurity trends and risks businesses and consumers must keep top of mind in 2013. These include cyberwarfare, data breaches, migrating malware, …

What DDoS attacks reveal about your security infrastructure

As we close out 2012, there is no doubt that this year will go down as epic in the history books of information security professionals. Looking back on the year it’s not …

Database hacking: The year that was

Have you ever been to the Privacy Rights Clearinghouse site? It tallies all the data breaches that have occurred in United States since 2005. What you read there is really …

Trends in mobile ransomware, large-scale attacks and hacktivism

McAfee today released its annual 2013 Threat Predictions report, highlighting the top threats McAfee Labs foresees for 2013. In the coming year, McAfee Labs expects that …

Most unique viruses of 2012

PandaLabs outlined its picks for the most unique viruses of the past year. Rather than a ranking of the most widespread viruses, or those that have caused most infections, …

Only 8% of UK organizations have BYOD policies in place

As enhanced efficiency, employee productivity and the reduced burden on IT teams continue to drive adoption of Bring Your Own Device (BYOD), a recent survey of more than 500 …

Top 10 risks found by your auditor

KirkpatrickPrice offers a list of the most common risks they find. 1. No formal policies and procedures Formal guidelines of policies and procedures help provide your …

Top 10 telecom trends for 2013

MDSL published its Top 10 Telecom Trends for 2013. 1. TEM, MDM and MAM market: further consolidation to come 2012 saw a raft of acquisitions, driven mainly by Tangoe burning …

Week in review: Android spam-spreading botnet, highest profile software failures of 2012, and data center design innovations

Here’s an overview of some of last week’s most interesting news, interviews and articles: Improving information security with one simple question Anyone who has …

Mobile malware, botnets and attacks on the cloud to rise

ESET has published its annual review of the past year’s threat trends and compiled predictions for 2013. According to the new report, the 2013 threatscape will see major …

Ten tips for mobile security

Mobile devices have become increasingly common and the markets are flooded with new applications for business and entertainment. People are using mobile devices to play games, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools