Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Breakdown of security weaknesses by industry and organization size

WhiteHat Security released the tenth installment of its Security Website Security Statistics Report, providing a first-time breakdown of the state of website security by …

Cybersecurity tips for the enterprise

With the recent rise in malvertising, high-impact data breaches and other malicious security threats, the practices and secure infrastructure of legitimate marketers …

New software improves ability to detect malware in cloud-computing systems

Researchers from North Carolina State University have developed new software that offers significantly enhanced security for cloud-computing systems. The software is much …

Phishers still favor spam over social networking sites

SpamTitan Technologies announced the findings of its latest survey of SMBs on the continued danger of phishing attacks, and it shows that despite media reports about the rise …

One in five students have hacked, one in three did it for fun

Research published today by Tufin Technologies reveals that 23% of college and university students have hacked into IT systems. Of these hackers, 40% waited until after their …

Adobe releases security update for Flash Player

New versions of Adobe Flash Player have been released today in order to patch a critical vulnerability in earlier versions of the program for Windows, Macintosh, Linux, …

Mobile fraud detection imperative for the future of mobile commerce

By year-end 2013, location information or profile information from mobile phones will be used to validate 90 percent of mobile transactions, and the rapid adoption of …

Testing tool for packet filtering and access control systems

Idappcom launched Traffic IQ V2.0, an automated auditing and vulnerability assessment testing tool that has an extensive traffic library that includes thousands of real …

Week in review: Smartphone security risks, botnet offering DDoS services, defense of the future Internet

Here’s an overview of some of last week’s most interesting news, interviews and articles: “Here you have” virus authors may be based in Spain …

Q&A: RSA Conference Europe 2010

Linda Lynch is the RSA Conference Europe Manager and in this Q&A she provides an overview of this year’s event. Where do you see RSA Conference Europe fit in the …

Seagate’s self-encrypting hard drive earns U.S. Government certification

Seagate’s Momentus Self-Encrypting Drive, the world’s first laptop hard drive with built-in encryption to protect against unauthorized access to information on …

80% of network attacks target web-based systems

2010 has brought the use of the Internet for conducting business to an all-time high; however, attacks continue to strike networks more than ever by using sophisticated …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools