Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Chinese Army unit is behind cyber espionage campaigns, researchers claim

Mandiant, the computer forensic and incident response firm that got called in following the recent breaches of the New York Times‘ and Wall Street Journal‘s …

The sophistication of risky apps, mobile misbehavior and spyware

McAfee released the results of a new report, documenting sophisticated and complex risky apps containing multi-faceted scams, black market crimes, drive-by downloads and …

Anonymous hacks U.S. State Department and investment firm, leaks data

Anonymous continues with its Operation Last Resort, and its latest targets were the websites of the U.S. Department of State (state.gov) and of investment firm George K. Baum …

F5 Networks releases hybrid cloud solution for mobile application management

F5 Networks announced F5 Mobile App Manager, a new hybrid cloud solution for mobile application management that enables organizations to safely support enterprise BYOD …

Duo Security launches secure mobile ID

Duo Security announced that the high level of security traditionally associated with hardware smart cards is now available on consumer mobile devices that use Duo’s …

Modeling, customizing, and automating applications with AWS OpsWorks

Amazon Web Services launched AWS OpsWorks, an application management solution for the complete lifecycle of complex applications, including resource provisioning, …

Delta Airlines spam delivers Citadel Trojan

Roman H??ssy over at Zeus Tracker warns about a Delta Airlines-themed spam campaign that ultimately leads to a variant of the Citadel malware – a banking Trojan that is …

Virtual appliance fuels Bring Your Own Identity

NetIQ announced SocialAccess, a virtual appliance that allows business and government entities to leverage social identity providers to share select identity information for …

Antibot: Network-based botnet removal tool

Botnets are flourishing with new packaging, new methods and new business models. ZeroAccess, the world’s fastest-growing botnet, infected millions of computers in 2012, …

BlackBerry Enterprise Server can be compromised due to TIFF-processing vulnerabilities

BlackBerry has released details about two critical vulnerabilities that can allow attackers to access and execute code on systems running BlackBerry Enterprise Server. The …

Freezing Android devices to break disk encryption

Two German computer scientists have proved that it’s possible to access and recover data from an encrypted Android smartphone by performing a set of simple and easily …

How to successfully submit conference talks

There are many ways a security professional can increase his public profile, and one of these is speaking at a conference. However, getting your work accepted at an event is …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools