Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Recent HIPAA/HITECH changes

As part of the American Recovery and Reinvestment Act of 2009, Congress enacted the Health Information Technology for Economic and Clinical Health (HITECH) Act to broaden and …

Secure platform for connected mobile devices

AuthenTec introduced its new SafeZone secure platform solution for mobile and consumer systems on a chip (SoCs). The SafeZone Secure Platform solution allows chip makers and …

New business security products from G Data Software

G Data Software announced the availability of its Version 11 product line, enhanced to provide businesses with the most up-to-date technology for protection across their …

Toshiba admits to hack, customer data loss

Toshiba has confirmed the claims of a hacker that managed to compromise one of its US sites and steal and publish part of a user database on pastebin.com. While the hacker …

NetSecL Linux 3.2 released

NetSecL is a hardened, live and installable operating system based on OpenSuse suitable for desktop/server and penetration testing. Once installed you can fully enjoy the …

Facebook scammers use Tumblr sites to evade detection

Facebook users are targeted once again by survey scammers, and this time the lure is a video of a woman exposing herself on live television: There are two versions of the …

Microsoft offers $250,000 reward for botnet information

Microsoft decided to extend their efforts to establish the identity of those responsible for controlling the Rustock botnet by issuing a $250,000 reward for new information …

Fake financial statements and postal documents lead to fake AV

Fake emails purportedly coming from financial institutions and the post are currently hitting inboxes and are carrying a malicious .exe file disguised as a Word document. …

EU data breach notification law under advisement

The recent onslaught of cyber attacks against a variety of companies big and small and the consequent compromises of user information gathered by them has led the European …

An anonymous social network in the making?

Spurred by blocked accounts of Anonymous members and activists on various popular social networks such as Facebook, Twitter, and (recently) Google+, a group apparently loosely …

Vulnerable firmware could destabilize Internet-enabled technologies

Kill switches and backdoors inserted at the point of manufacture could act as a conduit for organized criminals or foreign states to access internet-enabled devices, according …

Active Directory Change Reporter 7.0 released

NetWrix released Active Directory Change Reporter 7.0 which automates auditing of who changed what, when and where in Active Directory, Group Policy and MS Exchange, for …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools