Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Network vulnerabilities IT admins can use to protect their network

Being able to adapt to change is one of the most important abilities in security today, mostly because attacks to defend against are able to do the same. The sophistication of …

5 tips for security behavior management programs

Security awareness has long been a point of frustration for information security professionals. While many organizations conduct awareness training of some kind, they have …

80% of business users are unable to detect phishing scams

McAfee Labs revealed that phishing continues to be an effective tactic for infiltrating enterprise networks. Testing business users’ ability to detect online scams, the …

Critical Security Controls adoption and implementation

A new SANS survey reports 90% of organizations taking the survey have adopted some or all of the Critical Security Controls (CSCs), and that financial and government …

9 ways to protect data on your smartphone

Recent headlines of Hollywood celebrities’ nude photos leaking onto the Internet remind us of the privacy risks we face when we store personal data – particularly …

Linux systems infiltrated and controlled in a DDoS botnet

Akamai Technologies is alerting enterprises to a high-risk threat of IptabLes and IptabLex infections on Linux systems. Malicious actors may use infected Linux systems to …

Big Data is big noise

Big Data was supposed to be the solution to all our security problems, but this spotlight on intruders turned out to be a mess of white noise. Hiding comfortably in that …

Cybercriminals love PayPal, financial phishing on the rise

Kaspersky Lab’s experts reported a substantial increase in the amount of financial phishing in spam. There was a 7.9 percentage points increase in the amount of scam …

Free security software identifies cloud vulnerabilities

Whether responding to customer orders or requesting partner data, the biggest cloud security concern for the enterprise is the direct communication between applications. To …

How PCI DSS 3.0 impacts business owners

If your business processes, transmits, or stores credit card data, you are subject to the Payment Card Industry Data Security Standards (PCI DSS). PCI DSS 3.0 went into effect …

160,000 new malware samples appear each day

Malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated, at an average rate of 160,000 every day, according …

Expert international cybercrime taskforce tackles online crime

Hosted at the European Cybercrime Centre (EC3) at Europol, the Joint Cybercrime Action Taskforce (J-CAT), which is being piloted for six months, will coordinate international …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools