Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Mobile users: Risky behavior and weak security

Researchers found that while an increasing number of consumers use mobile devices for both business and personal activities, large numbers are not familiar with their …

iPhone hardware encryption investigated

Users of Apple iPhone devices accumulate huge amounts of highly sensitive information stored in their smartphones. Historical geolocation data, viewed Google maps and routes, …

iPhone 5 spam run leads to malware

The date of the release of iPhone 5 is still unknown, but that doesn’t stop malware peddlers from using it to lure in Apple fanatics. After all, didn’t a recent …

phpMyAdmin redirection weakness and script insertion vulnerability

A weakness and a vulnerability have been reported in phpMyAdmin, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to …

GFI LANguard 2011 released

GFI Software launched GFI LANguard 2011, the latest version of the network vulnerability scanning and patch management solution. GFI LANguard 2011 is the first network …

40% of IT staff could wreak havoc to your network

A survey showed that 40% of IT staff admit that they could hold their employers hostage – even after they’ve left for other employment – by making it …

Programmer sentenced for accessing ATMs using malicious code

A former Bank of America (BOA) computer programmer was sentenced to 27 months in federal prison for unauthorized access to the financial institution’s protected …

1.5 billion smart credentials to ship

The increasing use of smart cards and biometric capture has changed the way government and healthcare citizen ID documentation is viewed, managed and deployed. Many …

Week in review: Fox breach, SpyEye targeting Verizon and fake Macs rogueware

Here’s an overview of some of last week’s most interesting news and articles: Five ways to migrate applications to the cloud Organizations seeking to move …

The progress of IT threats in 2010

Cyber criminals have capitalized on the recent growth in popularity of the Android mobile platform. Based on the number of new mobile malware signatures detected during this …

Tool for analysis of DOM based XSS issues

DOMinator is a Firefox based software for analysis and identification of DOM based Cross Site Scripting issues (DOMXss). It is the first runtime tool which can help security …

Best practices to reduce risk in cloud contracts

IT procurement or sourcing managers challenged with finding sourcing options that reduce costs at tolerable risks should examine nine contractual terms to reduce risk in cloud …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools