Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
New SDKs for biometric identification and object recognition

Neurotechnology released new versions of the company’s product line of SDKs for biometric fingerprint, face, iris and voice identification and object recognition. The …

A walk through the expo at InfoSec World 2012

Taking place right now in Orlando, Florida, is InfoSec World Conference & Expo 2012, and Help Net Security is on-site. Here’s a peek at the show floor featuring …

File transfer with end-to-end encryption

Steganos Software announced Elefile – a secure web-based file transfer solution that can be used on any computer or laptop without installing software. Created for …

UK enterprises fear EU Data Protection Act

The proposed EU General Data Protection Regulation could spell trouble to UK businesses, says independent IT integrator SecureData, as its “EU General Data Protection …

Researchers link string of breaches to Chinese man

Security researchers rarely managed to trace hacking attacks back to a person or a specific entity, but it seems that Trend Micro experts have succeeded in tying a former …

Manage Linux and UNIX privileged access

BeyondTrust released PowerBroker Servers Enterprise which allows organizations to seamlessly manage privileged access on Linux and UNIX systems across dynamic physical, …

Potential first Android bootkit spotted

Security researchers of US-based NQ Mobile have recently discovered what might be the first Android bootkit. Dubbed DKFBootKit, the malware piggybacks malicious payloads into …

1.5 million cards compromised in Global Payments breach

A massive breach of the processing system of Atlanta-based Global Payments has been confirmed by the company. “The company believes that the affected portion of its …

Cloud computing trends that will affect cloud strategy

Continual monitoring of cloud computing trends, with regular updates to the enterprise’s cloud strategy, will be essential to avoid costly mistakes or miss market …

Deconstructing local and remote file inclusion attack vectors

Imperva released its latest Hacker Intelligence Initiative report exploring how Local and Remote File Inclusion (RFI/LFI) attacks enable hackers to execute malicious code and …

Learning iOS Programming, 2nd Edition

Get a rapid introduction to iPhone, iPad, and iPod touch programming. With this easy-to-follow guide, you’ll learn the steps necessary for developing your first …

Week in review: Massive Zeus C&C servers seizure, Android security, and the challenges of being a CISO

Here’s an overview of some of last week’s most interesting news, reviews, podcasts, interviews and articles: Microsoft disrupts massive cybercrime operation In its …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools