Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Koler worm spreads via SMS, holds phones for ransom

A new variant of the Android malware Koler now spreads by text message and holds infected users’ phones hostage until a ransom is paid. AdaptiveMobile detected the …

60% of Android attacks use financial malware

Malicious programs targeting Android-based devices in order to steal money were used in 60 percent of attempted attacks registered by Kaspersky Lab security products, …

Cloud adoption trends in European organizations

In Europe, the number of cloud services in use by the average company increased 23 percent, rising from 588 in Q1 to 724 in Q3. However, not all of these services are ready …

What all major brands share in common with the Snappening

By now we have all heard about “The Snappening”—hyped as a high-profile data breach involving the photo-sharing application Snapchat. Virtually every news outlet …

Small healthcare facilities unprepared for a data breach

While healthcare breaches are on the rise, most small facilities feel that their systems adequately limit the risk of a data breach despite one in three facilities spending …

The Software Assurance Marketplace: A response to a challenging problem

With the steady proliferation of wearable devices and the emergence of the Internet of Things, everyone and everything will eventually be connected by some piece of software. …

Infographic: A brief history of malware

From simple disk-to-disk attacks in the 80s to email viruses in the modern day, malware is here to stay. This ESET infographic offers you insight about the origins and …

Week in review: POODLE bug, Microsoft patches a slew of 0-days exploited in the wild

Here’s an overview of some of last week’s most interesting news and articles: Identifying deceptive behavior in user-generated content In this interview, JT Buser, …

Targeted attack protection via network topology alteration

When it comes to targeted attacks, attackers are not omniscient. They need to gather information in the early stages to know the target they may gather information from …

The impact of disconnected security strategies

39% of organizations’ IT departments are spending too much time managing their security network and manually tackling threats, according to McAfee. Almost a third of IT …

GFI Software redesigns WebMonitor 2015

GFI Software announced GFI WebMonitor 2015, the latest version of the company’s Web filter, management and security solution for businesses. GFI completely redesigned …

Linksys releases high performance 4X4 wireless AC router

Linksys unveiled its first 4×4 Wireless AC router aimed at households with multiple internet users as well as single users who use the internet for high bandwidth …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools