Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
In wake of breach, eBay has to deal with multiple web vulnerabilities

As eBay flounders while trying to adequately respond to the breach it disclosed last week, and deems weak passwords to be good but stronger ones to be weak, researchers are …

Week in review: eBay breach, Linux Trojans, US charges Chinese military hackers for spying on US firms

Here’s an overview of some of last week’s most interesting news, podcasts, and articles: Record month for Linux Trojans If you think that you are protected from …

China will start screening IT products

The Chinese government has announced that it will start vetting IT products and services that are to be used on networks and systems important to national security and public …

Anti-surveillance mask foils facial recognition systems

The unnerving ubiquity of security cameras in public places and the fact that an increasing number of them are connected to facial recognition systems has spurred …

Google Image Search results redirect to Browlock ransomware

Browlock is the most basic approach to ransomware there is: there is no actual malware that blocks the victims’ computer or encrypts its contents, there is only a Web …

Facebook introduces privacy check up tool

Facebook continues on its course to give users more privacy by making “Friends” the default sharing option for first time posters, and by introducing a privacy …

Netwrix extends auditing visibility into SharePoint changes

SharePoint has become a popular business application for storing data, sharing content and powering websites. For many organizations, it is the core of their collaboration …

What is the key to IT program management?

The ability to categorize IT programs and assign them appropriate tactics, skills and resources is critical to the generation of positive outcomes, according to Gartner, inc. …

Trust in the U.S. cloud on the decline

Perspecsys revealed a continental cloud divide between the U.S. and Europe, based on data findings from a study it conducted at Infosecurity Europe 2014. Perspecsys surveyed …

POS facial recognition can prevent fraud

Lately, the news has been filled with stories of identify fraud. This, paired with the increase in mobile payments, furthers the need for companies to have access to enhanced …

Mobile app for single sign-on access to thousands of applications

Ping Identity announced a native mobile application that delivers single sign-on (SSO) access to thousands of applications from any device. Available for iOS and Android, the …

CERN, MIT scientists launch Swiss-based secure webmail

Last week marked the beta release of yet another encrypted, secure email service, and interest for it was so overwhelming that its developers had to temporarily close the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools