Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Flaw in boarding pass check system puts fliers in danger

Everybody knows by now that airline boarding passes have barcodes that, when decoded, show a series of letters and numbers that “summarize” the main information …

Why mobile malware is big in China and Russia

According to Lookout’s State of Mobile Security Report 2012, “Toll Fraud” malware has become the most prevalent type of malware within the past year due to …

BYOD security and control fears

Enterprises are restricting employee access to vital work applications due to security and control fears, according to Ping Identity. Employees were found to use an average of …

Free mobile app profiler for risk assessment

At RSA Conference Europe 2012, Zscaler announced the results of an analysis from ThreatLabZ which reveals that up to 10 percent of mobile apps expose user passwords and login …

Cloud Security Alliance outlines top mobile threats

The Cloud Security Alliance (CSA) Mobile Working Group released findings from a new survey that calls out the specific security concerns enterprise executives say are the real …

Interesting times for information security professionals

There is an old saying, which some attribute as an old Chinese proverb, that states “May you live in interesting times.” Some say that this is a blessing you may …

F-Secure Mobile Security protects Android TVs and set-top boxes

F-Secure launched a new version of F-Secure Mobile Security which features support for standard Android devices including TVs and set-top boxes. The new version also comes …

Key components for mobile device management of BYOD

The Cloud Security Alliance (CSA) Mobile Working Group released a research report identifying 17 key elements that are critical for organizations to consider for the full …

RSA unifies identity and access management

RSA announced new solutions within its Identity and Access Management (IAM) suite designed to address security challenges that require new ways to manage and protect the …

Trend Micro expands consumer mobile portfolio

Trend Micro expanded its consumer mobile offerings to secure, enhance and simplify people’s mobile lives. The new release of Trend Micro Mobile Security Personal Edition …

The QR code: A new frontier in mobile attackability

A single poisoned link is all it takes to expose an entire organization to a full-scale attack. Hackers write sophisticated browser-based attacks that operate quite …

WD unveils thinnest 2.5-inch hybrid hard drive

WD announced it is sampling a 5mm-thin hard disk drive featuring hybrid technology. WD has developed hard drives slim enough for integration into today’s thinnest …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools