Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
fire
McAfee uses web beacons that can be used to track and serve advertising to users

A test of seven OEM laptops running Windows has shown consistent privacy and security issues, including an interesting revelation that the McAfee Antivirus running on six of …

keyboard
Insight into critical data remains limited

SANS surveyed 829 IT professionals with endpoints located around the globe to explore how IT professionals monitor, assess, protect and investigate their endpoints. A majority …

Dell SecureWorks speeds up endpoint intrusion detection, response

Dell SecureWorks is launching Advanced Endpoint Threat Detection (AETD) Red Cloak, a fully-managed SaaS solution that can slash the time required to detect and respond to …

abstract
Critical gaps in IT departments’ approach to enterprise security

A new study by conducted by Ultimate Windows Security, released at RSA Conference, provides visibility into the uses, concerns and challenges that IT departments face in …

cososys Endpoint Protector
Endpoint Protector: Fight data leakage on Linux workstations

At RSA Conference 2016 in San Francisco, CoSoSys released Endpoint Protector DLP for Linux in Private Beta, enabling protection against data leakages for confidential data on …

Fire
The rise of polymorphic malware

97% of malware is unique to a specific endpoint, rendering signature-based security virtually useless. The data collected by Webroot throughout 2015 shows that today’s threats …

Linux
Protecting enterprise data centers from threats that target Linux servers

Today’s internet is largely powered by Linux servers, many of which have become the target of attackers looking to utilize this vast pool of resources for much larger and more …

user
Endpoint security really can improve user experience

Traditional security policies are intrusive and impact user productivity. This is unfortunately the opinion of most end users. In fact, according to a recent study performed …

User key
Surge in endpoints drives need for security

The two most transformative trends impacting IT service providers (ITSPs) are endpoint growth and demand for security services according to a new Autotask survey of more than …

Keyboard
Confusion about IT security leaves devices at risk

When it comes to Internet security, consumer concern and awareness are both on the increase. However, despite a growing recognition of the need to protect devices, many …

Endpoint security lags in spite of vulnerabilities

Endpoint security solutions today continue to lag, failing to provide adequate protection or detection against today’s security threats, according to Promisec. Survey results …

Attackers use Google Drive, Dropbox to breach companies

A new type of attack, “Man in the Cloud” (MITC), can quietly coopt common file synchronization services, such as Google Drive and Dropbox, to turn them into devastating attack …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools