Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Switching to the Mac: The Missing Manual, Lion Edition

There’s never been a better time to switch to Mac OS X and David Pogue’s newly released Switching to the Mac: The Missing Manual, Lion Edition can help you do it. …

Active fake AV spam campaigns hit Twitter

Two distinct malicious spam campaigns are currently targeting Twitter users and taking them to compromised sites serving rogue AV and scareware software, warns GFI. The …

Bank accounts of 3 million Iranians compromised

A former manager of an electronic banking clearance and automated payments system in Iran got tired of waiting for banks to fix a security vulnerability that put their …

Apple enhances Apple ID account security

iOS device owners whose Apple ID account may have triggered a flag with Apple’s security team have been asked to set up three new security questions and a backup email …

Bogus “Account limit exceeded” emails targeting Yahoo users

Fake Yahoo email notifications are hitting inboxes and urging users to verify their account because it has “exceeded its limit”, Hoax-Slayer warns. The message is …

Use iPads and iPhones securely on the job

MokaFive, whose software is driving the use and acceptance of Macs in the enterprise, is now doing the same for the iPad and iPhone. The new MokaFive for iOS unites work and …

Behind the scenes of the cleanest ISP in the world

The malware and botnet problem has been around for quite a while, and definitive solutions for it are still eluding the Internet and mobile communication industry, as well as …

Scalable network encryption for the cloud

Certes Networks announced the vCEP (virtual Certes Enforcement Point), a scalable network encryption solution for the cloud. This virtual appliance allows organizations to …

Application control with Faronics Anti-Executable

Faronics released a new version of Faronics Anti-Executable, an application control tool that ensures endpoint security by only permitting approved executables to run on a …

What is the top target of cyber attacks?

Customer, student, employee and patient information is most at risk for cyber attacks today, and defending that data is a top concern for IT professionals this year, according …

Big data disruptions can be tamed

Enterprise architecture (EA) practitioners have a major role in ensuring their organizations maximize the business opportunities posed by big data, according to Gartner. Big …

Optimize Android for free with Bitdefender Power Tune-Up

Bitdefender launched Power Tune-Up, a free app to maximize the performance of your Android while sparing battery power and controlling data traffic. “Bitdefender is …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools