Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Profile Analyzer: Protect websites from cyber attacks

Silver Tail Systems announced Profile Analyzer, which provides real-time analysis of both individual user behavior and crowd behavior on websites to identify malicious …

Is Ukraine the perfect place for hackers?

What is it that makes the Ukraine such a fitting refuge for hackers and cyber crooks? According to a number of well-informed individuals, it is a combination of inadequate …

Key management device for payment security

Thales announced its Key Management Device (KMD) for payment hardware security modules (HSMs) to provide high assurance security for the critical task of forming cryptographic …

Malware sophistication worries IT leaders

More than half of IT leaders (62 percent) fear that malware is growing more sophisticated faster than they can upgrade their analysis capabilities. Additionally, 58 percent …

The evolution of malware and the threat landscape

The past 10 years represent a very interesting timeframe for reviewing vulnerability disclosures and ensuing changes that continue to affect risk management in IT …

Microsoft adds new protection mechanisms to IE 10

At the CanSecWest conference held last week in Vancouver, a team of vulnerability researchers from French security firm VUPEN has managed to hack Microsoft’s Internet …

BYOD security for cloud Wi-Fi access

AirTight Networks introduced device fingerprinting techniques in its SpectraGuard Enterprise WIPS and AirTight Cloud Services that provide BYOD security and detection, …

Fake online streaming service phishes and robs users

With high-speed Internet being now a common enough thing in many parts of the world, many users have taken to watching films and videos via online streaming. Unfortunately, …

China escalating Tibetan cold war into cyberspace

AlienVault has discovered a range of spear phishing attacks taking place against a number of Tibetan organizations, apparently from Chinese attackers. The attacks signal a …

Machine Learning for Hackers

If you’re an experienced programmer interested in crunching data, Machine Learning for Hackers will get you started with machine learning—a toolkit of algorithms that …

Microsoft patches seven distinct vulnerabilities

We have a total of six bulletins from Microsoft this month, addressing seven distinct vulnerabilities. It’s a pretty light month, but all of your focus should be on …

Apple fixes 83 vulnerabilities in Safari

Apple issued a patch for Safari, fixing 83 vulnerabilities, 72 of which were rated critical. Since Safari and Chrome both use WebKit, the open-source browser engine, it allows …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools