Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
All-terrain, military-grade next generation firewall

Stonesoft announced its MIL-320 Next Generation Firewall/VPN appliance that provides military-grade network security in a rugged go-anywhere unit. The MIL-320 appliance packs …

ExploitHub confirms breach

ExploitHub.com, the well-known online marketplace where one can buy exploit code for disclosed vulnerabilities, has confirmed that its web application server was compromised, …

Blue Coat delivers visibility and control for networks

Blue Coat Systems introduced new updates for Blue Coat PacketShaper appliances that enable businesses to embrace Web, cloud and mixed-use recreational applications on the …

Three people arrested in U.K. over “police ransomware”

The U.K. Metropolitan Police’s Central e-Crime Unit has arrested three individuals that have allegedly participated in a scheme to defraud Internet users by making them …

Mac users hit with fake installer and SMS fraud

Malicious installers of the Trojan.SMSSend malware family have, until now, targeted Windows users, but researchers from Russian security company Doctor Web have now unearthed …

5 cloud myths that will be debunked in 2013

There are a lot of common misconceptions and myths related to cloud computing. Many think of the cloud as less secure and reliable than on premise solutions, when in reality …

Motivations, trends and measurement of IT security spending

A new comparative survey by The Ponemon Institute explores the motivations behind IT security spending among UK and US organizations, and how industry regulations, data breach …

IT security implications of key technology trends for 2013

Automated controls are increasingly being used by organizations to manage the cost of compliance and reduce their business risk believes Turnkey Consulting. Their latest …

Most security pros want more desktop privilege control

While the majority of security professionals recognize the importance of limiting administrative rights on corporate desktops and laptops, many organizations continue to lag …

Researchers uncover Tor-powered Skynet botnet

Rapid7 researchers have recently unearthed an unusual piece of malware that turned out to be crucial to the formation of an elusive botnet – dubbed Skynet by the …

Exploit tool hitting Joomla and WordPress sites

Joomla and WordPress sites’ administrators should consider updating to the latest version of their respective content management system as soon as possible since, …

Facebook changes privacy policies, scraps user voting

The voting period for the proposed changes to Facebook’s Statement of Rights and Responsibilities and Data Use Policy has ended on Monday, and despite the email sent out …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools