Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Motorola is working on electronic tattoos and authentication pills

Motorola is trying to get back into the swing of things when it comes to innovation, and has been working on a number of fresh ideas regarding the future of authentication. At …

Employees continue to use risky apps on mobile devices

Risky applications and business applications are being used side-by-side on devices owned by employees that are used for work, according to a survey by the SANS Institute. …

Amazon launches sign-in service

Amazon launched Login with Amazon, a new service that will enable the over 200 million active Amazon customers to securely and simply login to apps, games, and websites. …

Parents should be concerned about app security

Veracode released an infographic outlining the importance of mobile application security for children. It provides parents with tips for protecting their children, their …

University of Illinois CS department machines compromised

Several computers in the University of Illinois Computer Science Department have apparently been compromised to host malware-serving websites, security researcher Conrad …

ISACA releases guide for performing business-relevant assessments

Establishing confidence in IT processes and controls is important, but audit and assurance processes often represent a pain point for business partners. Their perception is …

Real-time identity alerts reduce fraud losses

Experian announced Precise IDSM Personal Protection Alerts, a product that notifies individuals in real time that their personal information is being used in an authentication …

Apache server bug allows remote code execution

The existence of a “moderately critical” Apache HTTP Server vulnerability whose exploitation could allow attackers to compromise the system and execute arbitrary …

Evernote rolls out 2-factor authentication for paying customers

2013 seems the be the year of 2-factor (or 2-step) authentication. Following the introduction of the feature by the likes of Apple, Microsoft, Twitter and WordPress, Evernote …

Google defines disclosure timeline for actively exploited bugs

The debate regarding responsible vulnerability disclosure and full vulnerability disclosure has been started many times in the past, and it’s an issue that will continue …

Migration and monitoring of Microsoft environments

Dell Software announced a series of new enhancements designed to help organizations optimize the migration, management and monitoring of Microsoft environments. Dell Software …

Drupal.org forces password reset following breach

The server hosting the official website of Drupal, the popular content management platform, has been compromised and sensitive user data was accessed by the attackers, the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools