Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Does business understand IT security?

The role of IT security is still not well-understood by business, according to a new survey by Turnkey Consulting. The survey asked IT professionals about their …

Cisco expands wireless LAN portfolio

Wireless networks have become a quintessential component for businesses, providing much more than basic connectivity. With the increasing adoption of 802.11ac, organizations …

Zorenium bot can now hit iOS users as well

If all the claims included in the adverts for the multi-platform, multi-purpose piece of malware called Zorenium are true, it could very well have a considerable impact on a …

Google: We didn’t access Arrington’s Gmail account to identify leaker

In the wake of the revelation that Microsoft has accessed a blogger’s Hotmail account in order to discover the identity of an employee who leaked company trade secrets, …

Cerberus app users warned about data breach

Users of the Cerberus anti-theft Android app have been receiving warnings from the Cerberus Security Team, urging them to change their password as they have been reset in the …

Hidden crypto currency-mining code spotted in apps on Google Play

You already know that cyber criminals are using malware to make victims’ computers mine crypto currencies for them, but did you know that your phone can be instructed to …

Analysis of 244,703 DDoS incidents

NSFOCUS released its DDoS Threat Report 2013, which details attack trends and methodologies over the past year. The report includes statistical analysis and key observations …

Are cybercriminals targeting your tax return?

Iovation is advising businesses and consumers about how to protect data and personal information to avoid identity theft during tax season. As the IRS has made it more …

Infographic: A phishing email’s route through the corporate network

For years, even decades, computer security has been seen as a technical problem that requires a technical solution. In recent years, enterprises have plowed billions of …

Retailers urge adoption of PIN-based credit cards

The National Retail Federation told the Senate that it’s time for an overhaul of the nation’s fraud-prone credit and debit card system, saying banks’ …

Surveillance is driving organizations away from the cloud

A third of IT security professionals do not keep corporate data in the cloud because of fear of government snooping, with the majority of them preferring to store sensitive …

Natural Security Alliance releases specs for strong authentication standard

The Natural Security Alliance has released the newest specifications for its world first strong authentication standard. The standard defines a strong authentication method, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools