Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Log Management 10 comes with compliance enhancements

Ipswitch announced its log management software solution, WhatsUp Log Management 10 which provides out-of-the-box security and compliance for businesses of all sizes. The …

HTML5-based mobile security platform

AirWatch released an HTML5-based MDM platform. By leveraging HTML5, AirWatch’s management console is now even more accessible from any web-connected device, regardless …

Scammers demand $143 from Windows users, threaten with file deletion

German Windows users are the latest target of some pretty brazen scammers, warns Panda Security. The whole thing starts with a Trojan – likely received via spammy emails …

iPhone 5 “test and keep” spam campaign

As the predictions about the release of iPhone 5 seem all to point to the beginning of October, cyber scammers have decided to add to the frenzy by offering the coveted device …

DigiNotar hacker shares details on GlobalSign breach

Yesterday, GlobalSign announced that it will not be issuing any more certificates until the claims about a breach into its networks made by the “Comodohacker” are …

Cybercriminals impersonating government agencies

GFI Software today announced its top 10 most prevalent threat detections for August 2011. Notable threats last month included spam and poisoned search engine results targeting …

Drupal Author Pane module security bypass weakness

A weakness has been reported in the Author Pane module for Drupal, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …

How to deal with Internet security threats

How to use the Internet while staying secure has always been a concern for businesses. Over the last couple of years there have been many changes in the Internet threat …

Mobile malware criminal command-and-control activity

Criminal operators continue to hone their craft in 2011 using crimeware that can be repurposed for multiple fraud opportunities, sold or leased to other criminals, and that is …

Identity theft protection tips for students

College students are especially attractive targets for identity thieves because they have unblemished credit records, making it easier for thieves to take out loans in their …

Photos: The look and feel of SecurityByte 2011

Help Net Security attended this India’s largest information security conference in Bangalore – SecurityByte 2011. The opening ceremony with conference founder …

Network encryption starter kit

Certes Networks announced a Network Encryption Starter Kit which enables organizations to experience the full benefits of multi-layer encryption. “Many enterprises and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools