Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
In-house control and encrypted voice calls

Cellcrypt announced Cellcrypt Private Switch, a private network that allows an organization’s administrators complete privacy over user identity and calling activity. …

Assess and score mobile application and device risks

Agiliance unveiled the new Agiliance Mobile Trust Service, an extension of the company’s Agiliance RiskVision platform, enables organizations to address mobile and BYOD …

IT consumerization still a threat

Despite the growing consumerisation of IT, the majority (63 per cent) of employees in the UK say that corporate IT is failing to secure all personal devices brought into the …

Mobile application reputation service from Veracode

Veracode is expanding upon its enterprise application security services to include mobile application intelligence. The introduction of Mobile Application Reputation Service …

Most businesses experienced a mobile security incident

79% of businesses had a mobile security incident in the past year, in many cases incurring substantial costs, according to Check Point. The report found mobile security …

Managed services for web, cloud and mobile app security

Cenzic has expanded its Cenzic Managed Services for Enterprise Application Security which now includes four levels of service including a special compliance-ready assessment …

Employees continue to use risky apps on mobile devices

Risky applications and business applications are being used side-by-side on devices owned by employees that are used for work, according to a survey by the SANS Institute. …

Parents should be concerned about app security

Veracode released an infographic outlining the importance of mobile application security for children. It provides parents with tips for protecting their children, their …

Addonics releases CipherUSB family of hardware encryption solutions

Addonics Technologies announced a family of USB hardware encryption solutions that protect data stored on hard drives, removable drives, flash media, optical media or in the …

Can mobile malware be activated via sensors?

Can mobile malware be activated via sensors available on current mobile devices, and receive commands through out-of-band communication methods? If you ask a group of …

Fighting cybercrime is on the right track

Despite the numerous security incidents that took place during the first quarter of the year, the fight against cyber-crime is on the right track, according to PandaLabs. …

Wi-Fi client security weaknesses still prevalent

Google Android, Apple iOS, BlackBerry, and Windows Mobile devices have an inherent security weakness in the method they use for connecting to Wi-Fi networks that has the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools