Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Key trends in ransomware, evasion techniques and social attacks

McAfee Labs released a predictions report, analyzing 2013 trends through its Global Threat Intelligence (GTI) service to forecast the threat landscape for the coming year. In …

Sophisticated and targeted attacks on the horizon

As 2013 draws to a close, Gavin Millard a security expert from Tripwire gazes into his crystal ball and predicts what 2014 has in store for us. Targeted mobile attacks will …

Will 2014 be the year of encryption?

Security experts at Unisys predicted that the coming year will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data …

Convenience still overrides security for mobile shoppers

Despite a huge increase in shopping on mobile handsets, shoppers do not have security in place to protect the identity and credit card data stored on the devices, according to …

IBM prevents services from running compromised code

IBM inventors have patented a technique that can enable businesses to improve cloud security and support secure transactions by preventing mobile devices from accessing …

CIOs lack the vision when it comes to mobility

Mobile Helix announced the findings of an independent CIO survey of 300 IT decision makers in the UK and US; exploring how enterprises are making use of mobile technology. The …

Rogue apps can remove Android device locks

Security researchers from German IT consultancy Curesec have uncovered the existence of an Android flaw that could allow hackers to remove all existing device locks activated …

Shopping convenience overrides security concerns

Tripwire announced the results of a survey on mobile security and holiday shopping. The survey was conducted by Dimensional Research and OnePoll from November 18-20, 2013, and …

BYOD is an applications strategy, not just a purchasing policy

Bring your own device (BYOD) is not just a purchasing policy and needs to be approached more broadly with the applications and strategies designed for today’s world, …

Mojave Networks unveils offering to protect mobile devices

Mojave Networks announced the availability of its cloud-based, enterprise-grade offerings to protect mobile devices starting at the network level. Using this approach, …

5 mobile app security tips

ICSA Labs released a list of 5 mobile app security tips to help enterprises protect their data. 1. Dynamic analysis is a must. If deploying security tested mobile applications …

MOVEit Cloud 8.0 extends managed file transfer to mobile devices

Ipswitch File Transfer launched MOVEit Cloud 8.0, adding mobile support to the MOVEit Managed File Transfer (MFT) cloud service. The MOVEit MFT system is used by businesses …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools