Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Attacking SCADA wireless systems

Leased lines are recurring costs throughout the power grid. The bottom line demands the use of wireless solutions where possible. Dare we? We already do. The video below, …

Mobile device data recoveries surge

Kroll Ontrack saw a 55 percent increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161 percent increase from 2011 to 2012. With more and more …

Fortinet to acquire Coyote Point

Fortinet has entered into a definitive merger agreement to acquire Coyote Point Systems, a privately-held provider of application delivery, load balancing and acceleration …

Week in review: Becoming a malware analyst, South Korean cyberattacks, Apple implements two-step verification for iCloud accounts

Here’s an overview of some of last week’s most interesting news, videos, podcasts, reviews and articles: Becoming a malware analyst If you’re considering a …

Apple adds two-step verification option to iCloud accounts

Apple has finally introduced a two-step verification feature that will allow its users to secure their iCloud (Apple ID) accounts, 9 to 5 Mac reports. The option is currently …

On US, China, cyber espionage, and cyber war

The accusations and recriminations lobbed back and forth between the United States and China regarding alleged state-sponsored cyber espionage attacks have become almost a …

Infosec Twitter wisdom: March 22, 2013

Here’s food for thought from people you should be following on Twitter. An IP address is not a smoking gun. — Dave Lewis (@gattaca) March 21, 2013 There’s no …

BYOD and data protection top concerns with cloud adoption

According to a new AccelOps survey, 65 percent of organizations are using cloud services, while only 46 percent have moved mission-critical applications and data outside the …

Piracy and IP theft trouble software publishers

A joint survey by SafeNet and SIIA of more than 620 software developers and 194 enterprise software end users, revealed that developers continue to struggle with how to secure …

Unraveling the South Korean cyberattacks

Wednesday’s news that the networks of several South Korean broadcasting organizations and banks have been partially or entirely crippled by coordinated attacks has …

Cisco devices saddled with weakened password encryption

Instead of improving it, an implementation issue has left a “limited” number of Cisco IOS and Cisco IOS XE releases with a weaker password hashing algorithm, …

GFI WebMonitor 2013 brings web filtering to off-network laptops

GFI Software announced GFI WebMonitor 2013, the latest version of the company’s Web security and filtering solution targeted at SMBs. This new version enables IT …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools