Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
A marathon of holiday spam

The main spam topics that emerged during the last quarter included the increase in spam during the holidays, mass mailings, malicious attachments and the distribution of …

Leveraging PCI standards to accept mobile payments securely

The PCI Security Standards Council (PCI SSC) published a customized fact sheet outlining how merchants can securely accept payments using mobile devices such as smartphones or …

Content-related threats cause significant data loss

Content-layer threats – those where an attacker leverages malicious software in what the user believes is harmless content – are posing increasing risks for …

Android security: Protection of Java and native apps

Arxan Technologies enhanced its Mobile Application Protection Suite to include multi-layered, end-to-end protection for Android applications. Given the open source nature of …

Cloud computing as key to improved data protection

More than half (55%) of U.S. organizations expect their use of the cloud to increase as part of their business continuity strategy over the next year, according to CA. …

IT is embracing BYOD

IT is accepting, and in some cases embracing, “bring your own device” (BYOD) as a reality in the enterprise. A new Cisco study shows some of the quantifiable …

Facial recognition technology for user authentication

DigitalPersona announced the latest release of its enterprise software which builds upon its existing support for a wide variety of user authentication methods by including …

Manage Windows event logs with Event Log Explorer

FSPro Labs released Event Log Explorer 4, designed to view, monitor and analyze events recorded in Security, System, Application and other logs of Microsoft Windows operating …

Intel strengthens security of its Core vPro platform

Intel announced the availability of its 3rd Generation Intel Core vPro processor-based platforms for business and intelligent systems. New capabilities embed security at every …

Online travel most vulnerable to email attacks

Agari released its first TrustIndex, a quarterly measurement that applies Agari’s big data insights to score email attack vulnerability and email trust by industry. …

Apple security update fixes QuickTime vulnerabilities

Apple just released an advisory addressing 17 security flaws in QuickTime Media Player. The update is rated critical as several of the fixed vulnerabilities can be used to …

Inside Windows Debugging

Rethink your use of Windows debugging and tracing tools, and use Inside Windows Debugging to learn how to make them a key part of test-driven software development. Led by a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools