Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Why wiping decommissioned IT assets should be a must

Last week I’ve written about the ways confidential data can leak outside the organization if the IT security team doesn’t pay attention to printers, shredders, or …

Attackers breach and encrypt TV station’s email server

The email server of FOX21 News has been hacked over the weekend and the information it contained held ransom. The attackers were asking for $5,000 to decrypt the information …

U.S. media sites compromised, lead to malware

At least five U.S. media sites and a number of other popular ones have been compromised and are redirecting visitors to malicious URLs, Zscaler warns. The sites have been …

A radical shift in security needs

During the last 40 years we’ve seen a small number of significant, user-driven shifts in the computing landscape, which change the way businesses and IT departments …

Increase Facebook privacy with Safe Profile

76 percent of consumers are concerned about their privacy when they share their life on social platforms. Facebook’s array of privacy settings, which enable users to …

Analyzing 450 million lines of software code

A new Coverity report details the analysis of more than 450 million lines of software code through the Coverity Scan service. The service, which began as the largest …

Many social accounts are still in danger

The recent hacking of the Associated Press’ Twitter account has begged the question, how secure are social media accounts? A study released by IObit reveals that 30% …

Malwarebytes backup service prevents malware uploads

Malwarebytes Secure Backup, released today, is an online backup service that automatically scans files for malware prior to backup, removing the threat of saving or sharing …

Dell acquires Enstratius

Dell today announced the acquisition of Enstratius, which helps organizations manage applications across private, public and hybrid clouds, including automated application …

IE8 0-day used in watering hole attacks

Last week a U.S. Department of Labor website was discovered to be redirecting users to sites serving a hard-to-detect variant Poison Ivy backdoor Trojan. Researchers are now …

McAfee to acquire Stonesoft

McAfee and Stonesoft today announced a definitive agreement to initiate a conditional tender offer for the acquisition of Stonesoft for approximately $389 million in cash. …

Malware you can “live with”, but shouldn’t

The main symptom of a computer being infected with the ZeroAccess (or Sirefef) malware is that online searches via Google Search often lead to unhelpful pages filled with ads …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools