Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
iPhones are immune to FinSpy infections

FinSpyMobile, the mobile spying software sold by German company Gamma Group, can’t be installed on iPhones that have not been jailbroken, shows one of the documents …

Data breaches and high-risk vulnerabilities continue to dominate

Cyber threats, data breaches and high-risk vulnerabilities have continued to dominate the first half of 2014. The severity of these attacks intensified against financial and …

Splunk App for Stream released

Splunk announced the availability of the Splunk App for Stream, which offers a new software approach for capturing real-time streaming wire data. The app is free for Splunk …

Square launches bug bounty program

Popular California-based financial services and mobile payments company Square has set up a bug bounty program on the HackerOne platform. The announcement was made at a panel …

What are the risks of virtual currency use?

Many consumers have heard about Bitcoin, but they don’t necessarily know anything about it: not the full spectrum of benefits, and definitely not the risks they can …

How fast can security pros detect a breach?

Tripwire announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas. Industry research shows most breaches go undiscovered …

BYOD: 10 ways to fight back

The adoption of BYOD policies in SMBs means that IT has to protect devices that they didn’t even specify, procure or configure. In addition, most companies are now …

IBM acquires Lighthouse Security Group

IBM has acquired the business operations of Lighthouse Security Group, a cloud security services provider. Based in Lincoln, Rhode Island, Lighthouse Security Group offers the …

Blackphone rooted at DEF CON?

Blackphone, the recently released security-oriented smartphone, has apparently been rooted. The feat was executed at the DEF CON hacker conference, where Jon Sawyer …

US switch to chip-and-PIN cards not a panacea for fraud

The massive breach that Target suffered late last year was the proverbial straw that broke the camel’s back and made the company decide to move to chip-and-PIN card …

Smart Nest thermostat easily turned into spying device

At this year’s edition of the Black Hat security conference, a group of researchers has shown how extremely easy is to hack into the smart thermostats manufactured by …

Only 1 in 100 cloud providers meet proposed EU Data Protection requirements

The EU General Data Protection Regulation is expected to be passed this year and take effect in 2015 but new research from Skyhigh Networks, suggests that only 1 in 100 cloud …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools