Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
iOS and Android more secure than PCs?

While the most popular mobile platforms in use today were designed with security in mind, these provisions are not always sufficient to protect sensitive enterprise assets …

Solution for Popureb rootkit infection

Bootkits are kernel-mode rootkit variants that hide in the computer’s master boot record (MBR) and are notoriously difficult to spot and, sometimes, to eradicate. …

Gannett Government Media user information stolen

The Gannett Government Media family of websites suffered a cyber attack on resulting in unauthorized access to files containing user information. The information in those …

Hackers publish stolen PayPal login credentials

LulzSec has been assimilated back into Anonymous, but their AntiSec campaign keeps going. It seems that their final wish has been granted for now, and other hacking groups …

Thousands of Tumblr accounts compromised

Tumblr users have been targeted with an aggressive phishing campaign in the last week or so and are still being lured into entering their login credentials for access to adult …

Encrypted voice calling for the iPhone

Cellcrypt Mobile for iPhone provides voice call encryption for commercially available off-the-shelf cell phones using government-certified security through an easy-to-use …

Security vendor applauds LulzSec attacks

In an unexpected move for a security company, SecurEnvoy today said that cyber break-ins and advanced malware incidents, such as the recent DDoS attack by LulzSec, should …

Identity theft doesn’t take vacations

Identity theft is a real risk and one that is amplified during the summer months. Recent survey results indicated that, whether booking flights at home, logging on at a Wi-Fi …

Protect your computer and phone from illegal police searches

Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your home to search …

Spammers push cloned apps on Android Market

No stone is left unturned, no option unexplored when it comes to online spamming, and the latest approach has shown that malware authors are not the only ones who have taken …

LulzSec ends 50 days hacking streak, says goodbye

The LulzSec “boat” has sailed into the sunset after 50 days of “disrupting and exposing corporations, governments, often the general population itself, and …

Privacy and data breach solutions for healthcare

Today, data breach in healthcare is a surreptitious threat, with a data breach in healthcare occurring every two days. Complicated by federal and state governments regulating …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools