Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Hidden security risks of top mobile apps

Appthority cast a spotlight on the hidden behaviors of the top free mobile apps. The report reveals the security issues raised by the BYOD movement, app market fragmentation …

What will the workplace of the future look like?

IT consumerization is dependent on an open-minded approach by organizations, and most likely to succeed with specific, pre-defined parameters, according to Dell and Intel. …

Location tracking becomes more attractive

In a GFI Software survey of more than 1,000 U.S. respondents, 12% say they would use location tracking to monitor their spouse’s whereabouts, while 31% of respondents …

CryptoAuditor: Privileged user access auditing

SSH Communications Security launched CryptoAuditor at the Black Hat USA 2012 conference. It helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with …

Novell makes BYOD enterprise ready

Novell announced the availability of ZENworks Mobile Management, which addresses the pain points device administrators and managers face today, including BYOD (bring your own …

Safe C++: How to avoid common mistakes

It’s easy to make lots of programming mistakes in C++. In fact, any program over a few hundred lines is likely to contain bugs. With this book, you’ll learn about …

Apple releases OS X Mountain Lion

Apple announced that OS X Mountain Lion, the ninth major release of its desktop operating system, is available as a download from the Mac App Store, available as an upgrade …

Scientists develop tool for improving app security

A team led by Harvard computer scientists, including two undergraduate students, has developed a new tool that could lead to increased security and enhanced performance for …

Sharp rise in SQL injections

FireHost revealed the latest statistical analysis of attacks successfully blocked by its servers. During the period of April to June 2012, web applications, databases and …

Microsoft Security Toolkit delivers new defensive technology

Microsoft’s Trustworthy Computing Group today released the Enhanced Mitigation Experience Toolkit (EMET) 3.5 Technology Preview, which includes new Return Oriented …

The state of document-centric security

The growing popularity of consumer-grade, browser-based file sharing applications, such as YouSendIt and Dropbox, has improved productivity within the enterprise, but at what …

Web sessions and mobile traffic visibility

Silver Tail Systems announced the availability of Silver Tail Systems Forensics 3.0, which extends security intelligence applied to user behavior and broadens reporting …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools