Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
An unsecured computer is worse than an unlocked home

Using a computer without security is riskier than leaving your home or car unlocked. In a survey of 1,637 Internet users aged 18 and older, Webroot asked respondents to gauge …

Poor internal security processes spell disaster

Poor internal security management processes present more risk than malicious threats. More than 50 percent of an AlgoSec survey respondents incurred a system outage due to an …

Mobile devices expose company data to vulnerabilities

Mobilisafe announced results of its SMB focused study. As part of a private beta program, participants evaluated a product that assesses the security risk of mobile devices …

Linksys Wi-Fi routers with app enabled capabilities released

Cisco unveiled a new line of Linksys Smart Wi-Fi Routers with app enabled capabilities. The three new routers offer support for Cisco Connect Cloud, which provides anytime, …

Smart meters vulnerable to false data injection

Power grids connect electricity producers to consumers through interconnected transmission and distribution networks. In these networks, system monitoring is necessary to …

Establishing a GRC program with Keylight Platform

LockPath released Keylight Platform 2.3 which gives users the ability to upload data files (.xls and .csv) and import them directly into DCF tables. In addition, Threat …

SecureZIP Reader for iOS released

PKWARE announced SecureZIP Reader for iOS, an application that secures enterprise and government data on phones and tablets. The SecureZIP solution secures corporate …

Using Mac OS X Lion Server

If you’re considering a Mac OS X server for your small business, school, nonprofit, or home network, Using Mac OS X Lion Server will help you get up and running in no …

Week in review: First Android bootkit, Global Payments breach, and how to do BYOD the right way

Here’s an overview of some of last week’s most interesting news, podcasts, interviews, videos and articles: Penetration testing tips, tricks and unusual situations …

SMS-controlled Android malware records calls

Researchers at NQ Mobile Security have discovered a new piece of Android malware that receives instructions, i.e. is controlled, via SMS. Dubbed TigerBot, the Trojan hides by …

Sophos finds unauthorized RATs on server, takes partner portal offline

Renowned security firm Sophos has taken down one of its partner portals (located at ) following the discovery of a compromise of the server on which it’s hosted. …

Searching for Easter eggs leads to malware

Blackhat SEO is a popular tactic for malware peddlers to distribute their wares to unsuspecting victims, and the weeks before major holidays are always a perfect time for …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools