Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
F-Secure advances fight against exploits

Exploitation of software vulnerabilities has become one of the most popular ways to gain access to users’ machines, but F-Secure is reinforcing its exploit defenses with …

U.S. tech companies sharing bug info with U.S. govt before releasing fixes

A recent report by Bloomberg’s Michael Riley has revealed that a great many U.S.-based companies are voluntarily sharing sensitive information with the U.S. national …

Guccifer hacks U.S. nuclear security agency chief

The hacker that goes by the online moniker “Guccifer” continues his crusade agains U.S. current and former government officials, and his latest victim is Neile …

Facebook, Microsoft and Apple disclose little on U.S. government data requests

The disclosure of details about the controversial PRISM program set up by the NSA has indubitably damaged the reputation of the companies involved in it, and some of them are …

British GCHQ spied on G20 delegates to gain advantage in talks

The British GCHQ has monitored computers and intercepted phone calls made by the foreign participants of two G20 summit meetings in London in 2009 and provided crucial …

Account takeover attempts have nearly doubled

ThreatMetrix announced its Cybercrime Index, a series of Web fraud data aggregated from 1,500 customers, 9,000 websites and more than 1.7 billion cyber events. In a recent …

It takes 10 hours to identify a security breach

Businesses are vulnerable to security breaches due to their inability to properly analyze or store big data, according to McAfee. The ability to detect data breaches within …

Cisco teams with IBM, Lancope, LogRhythm, Splunk and Symantec

Cisco introduced new developments with security partners and information-sharing techniques under its Cisco Security Technology Partner Ecosystem. Enabled by a new context …

Secure automated archiving from Imation

Imation launched its next generation object store, the Nexsan Assureon secure automated archive solution. It brings secure automated archiving to mid-sized organizations and …

Red Hat unveils OpenStack certification and solution marketplace

Red Hat’s OpenStack Cloud Infrastructure Partner Network now boasts more than 100 global technology industry leaders as members, including Bull, Dell, Fujitsu, Hitachi, …

Week in review: Reactions to PRISM, and the question of whether or not to hack back

Here’s an overview of some of last week’s most interesting news, articles and reviews: The future of online authentication Recently, Twitter has introduced …

Japan aims to monitor Internet-based communications

After having agreed on a draft of an official cybersecurity strategy earlier this month, Japan’s National Information Security Center (NISC) is looking to establish a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools