searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Week in review

Get our top stories in your inbox

Week in review: LulzSec hackers arrested, inadequate Android AV solutions, and the GitHub hack

March 12, 2012

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Pinterest users targeted with scams Pinterest, the pinboard-styled social …

Week in review: Facebook CSO interview, RSA Conference 2012 coverage

March 5, 2012

Here’s an overview of some of last week’s most interesting news, videos, interviews and podcasts: RSA Conference 2012 coverage Last week, the Help Net Security …

Week in review: The danger of self-selected PINs, researchers break video CAPTCHAs, and the Consumer Privacy Bill of Rights

February 27, 2012

Week in review: The danger of self-selected PINs, researchers break video CAPTCHAs, and the Consumer Privacy Bill of Rights Here’s an overview of some of last …

Week in review: Cheap cellphone tracking, Apple’s Gatekeeper, and Google secretly bypasses Safari’s “no tracking” settings

February 20, 2012

Here’s an overview of some of last week’s most interesting news and articles: Privacy pitfalls of online dating It used to be that you were pretty much anonymous …

Week in review: pcAnywhere code leaked, Trustwave revokes “MitM” certificate, and top reasons for IT layoffs in 2011

February 13, 2012

Here’s an overview of some of last week’s most interesting news, articles and interviews: Compromised DreamHost-hosted websites lead to scams Hundreds of websites …

Week in review: Reactions to VeriSign hack, Anonymous leaks FBI conference call, and the new issue of (IN)SECURE Magazine

February 6, 2012

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: The F-BOMB: A tiny $50 spying computer for DARPA As …

Week in review: “Frankenmalware”, Kelihos malware author revealed, and the tragic state of SCADA security

January 30, 2012

Here’s an overview of some of last week’s most interesting news: Tool used in Anonymous Megaupload campaign Looking at the LOIC downloads so far this year, …

Week in review: Zappos, Symantec breaches, identities of Koobface gang revealed, and Megaupload shutdown

January 23, 2012

Here’s an overview of some of last week’s most interesting news and podcasts: Google Docs hosted phishing schemes abound Sophos has recently spotted two distinct …

Week in review: Currency rounding attacks, Trustworthy Computing Initiative anniversary, and how to foil targeted attacks

January 16, 2012

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Most unusual laptop recovery stories From the good, the bad, and …

Week in review: Leaked Symantec code, the grayware problem, and securing Android for the enterprise

January 9, 2012

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Hackers aim to fight Internet censorship with own communication …

Week in review: Stratfor breach, brute-forcing WAPs and an analysis of Facebook attacks

January 2, 2012

Here’s an overview of some of last week’s most interesting news: What’s in store for us in 2012 Looking forward into what lies ahead for us in 2012, Zscaler …

Week in review: Mobile application security risks, holiday-themed scams, and reasons for ditching Java

December 26, 2011

Here’s an overview of some of last week’s most interesting news and podcasts: Windows 8 will have picture password sign in As much as security experts would like …

Posts navigation

1 … 39 40 41 42 43 44 45 46 47 48

Featured news

  • The challenges and advantages of building behavior-based threat detection
  • Product showcase: Group-IB Unified Risk Platform
  • How businesses are prioritizing data privacy
Detection, isolation, and negotiation: Improving your ransomware preparedness and response

What's new

New infosec products of the week: July 1, 2022

Product showcase: Group-IB Unified Risk Platform

The challenges and advantages of building behavior-based threat detection

Infosec products of the month: June 2022

Don't miss

The challenges and advantages of building behavior-based threat detection

Product showcase: Group-IB Unified Risk Platform

Evaluating the use of encryption across the world’s top one million sites

Evolving online habits have paved the way for fraud. What can we do about it?

How businesses are prioritizing data privacy

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers
  • Is your organization ready for Internet Explorer retirement?
  • Attackers aren’t slowing down, here’s what researchers are seeing

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise