Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
British GCHQ spied on G20 delegates to gain advantage in talks

The British GCHQ has monitored computers and intercepted phone calls made by the foreign participants of two G20 summit meetings in London in 2009 and provided crucial …

Account takeover attempts have nearly doubled

ThreatMetrix announced its Cybercrime Index, a series of Web fraud data aggregated from 1,500 customers, 9,000 websites and more than 1.7 billion cyber events. In a recent …

It takes 10 hours to identify a security breach

Businesses are vulnerable to security breaches due to their inability to properly analyze or store big data, according to McAfee. The ability to detect data breaches within …

Cisco teams with IBM, Lancope, LogRhythm, Splunk and Symantec

Cisco introduced new developments with security partners and information-sharing techniques under its Cisco Security Technology Partner Ecosystem. Enabled by a new context …

Secure automated archiving from Imation

Imation launched its next generation object store, the Nexsan Assureon secure automated archive solution. It brings secure automated archiving to mid-sized organizations and …

Red Hat unveils OpenStack certification and solution marketplace

Red Hat’s OpenStack Cloud Infrastructure Partner Network now boasts more than 100 global technology industry leaders as members, including Bull, Dell, Fujitsu, Hitachi, …

Week in review: Reactions to PRISM, and the question of whether or not to hack back

Here’s an overview of some of last week’s most interesting news, articles and reviews: The future of online authentication Recently, Twitter has introduced …

Japan aims to monitor Internet-based communications

After having agreed on a draft of an official cybersecurity strategy earlier this month, Japan’s National Information Security Center (NISC) is looking to establish a …

Asia-wide targeted campaign drops backdoor, RAT

A new and widespread phishing campaign has been discovered targeting businesses and government institutions across Asia, Trend Micro reports. Telecoms, oil and gas companies, …

Automated analysis of essential security controls

EiQ Networks announced ThreatVue, an out-of-the-box security monitoring solution that automates the implementation, analysis and remediation guidance of essential security …

In-house control and encrypted voice calls

Cellcrypt announced Cellcrypt Private Switch, a private network that allows an organization’s administrators complete privacy over user identity and calling activity. …

ISC-CERT warns about medical devices with hard-coded passwords

Approximately 300 different surgical and anesthesia devices, ventilators, drug infusion pumps, external defibrillators, patient monitors, and laboratory and analysis equipment …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools