Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Week in review: Security risks of networked medical devices, mobile apps still vulnerable to FREAK attacks

Here’s an overview of some of last week’s most interesting news and articles: Why senior managers need to be involved in data security There is now a growing …

Mobile app developers are not investing in security

Nearly 40 percent of large companies, including many in the Fortune 500, aren’t taking the right precautions to secure the mobile apps they build for customers. A new …

IT pros are taking action against the insider threat

2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organizations. Currently 56% of IT professionals in the US …

Signature antivirus’ dirty little secret

If you rely only on traditional, signature-based antivirus, you are going to get infected—and probably a lot! Antivirus was, and still is, a valuable addition to your layered …

Security risks of networked medical devices

Networked medical devices linked to the Internet of Things (IoT) hold tremendous promise if security is built in from the outset, according to a new report by Intel Security …

Many admit that passwords are their only IT security measure

New research from SecureAuth shows that despite much debate, the password isn’t dead yet as two in five IT decision makers (ITDMs) admit that passwords are their only IT …

Smart cities to use 1.1 billion connected things

Increasing urbanization is putting unprecedented pressure on city mayors to constantly balance the challenge of resource constraints against environmental sustainability …

Do your attackers know your network better than you?

Cyber crime is a lucrative business. In fact, to make the cyber attack as profitable as possible and to minimize the risk of getting caught, attackers and black hat hackers …

Why senior managers need to be involved in data security

The networking environment has changed radically in recent times. In today’s world of increasing wireless use, widespread BYOD, more home working, more remote access, …

Native Hadoop security tools are not enough

While an overwhelming majority of Hadoop users agree that data security is a critical requirement, most disagree or are not sure that its native security tools provide enough …

The need for information security innovation

The increasing number of connected devices is multiplying the probability of cyberattacks on companies across sectors. This is compelling organizations to adopt cybersecurity …

SSL Labs unveils free open source tool, new APIs

Qualys SSL Labs now includes free assessment APIs, accompanied by a free open source tool that can be used for bulk and automated testing of websites. These new enhancements …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools