Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Week in review: LinkedIn, Hotmail security flaws, Chrome apps with dangerous permissions and the evolution of Mac fake AV

Here’s an overview of some of last week’s most interesting news: 1.5 billion smart credentials to ship The increasing use of smart cards and biometric capture has …

Code in the Cloud: Programming Google AppEngine

Cloud applications are the next big shift in application development: instead of building single-user applications to run on a personal computer, new applications are being …

Cloud identity tools for LinkedIn, Twitter and Microsoft Live

Ping Identity released Cloud Identity Connectors for LinkedIn, Twitter, and Microsoft Live, enabling the enterprise to rely on cloud service providers and social networking …

SCADA SIEM for critical infrastructure protection

AlienVault released its ICS SIEM, a family of purpose-built appliances which provide a platform for security and compliance management across industrial process control …

Spam not the problem it once was

Email spam is still an everyday occurrence, but not the nuisance it once was, according to Avira. Nearly half of all end-users are satisfied with the anti-spam filters on …

How banks use Twitter to combat fraud

With phishing attacks hurting the credibility of email communications, forward thinking banks are turning to social media as the best channel to warn customers of scams and …

The evolution of traditional desktops into personal clouds

As users go virtual in all aspects of their life, the notion of doing all their work on a single traditional desktop in one physical location is rapidly evolving. …

IBM WebSphere Portal XSS vulnerability

A vulnerability has been reported in IBM WebSphere Portal, which can be exploited by malicious people to conduct cross-site scripting attacks, according to Secunia. Certain …

Spammers establish their own fake URL-shortening services

For the first time ever, spammers are establishing their own their own fake URL-shortening services to perform URL redirection, according to Symantec. This new spamming …

Cybercrime statistics show widespread phishing problem

The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services, according to KnowBe4. Using the Inc.com …

The rise of layered fraud prevention

By 2014, 15 percent of enterprises will adopt layered fraud prevention techniques for their internal systems to compensate for weaknesses inherent in using only authentication …

Mobile users: Risky behavior and weak security

Researchers found that while an increasing number of consumers use mobile devices for both business and personal activities, large numbers are not familiar with their …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools