Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
The disruption of Cryptolocker and GameoverZeus

Part of the difficulty in unraveling ZeuS botnet infrastructure is mapping it out. Attackers usually plant a generic dropper within an emailed file, disguised to look like a …

Opportunities and challenges for CIOs in different industries

CIOs around the globe may share common concerns, but there are considerable differences in their priorities, according to a global survey of CIOs by Gartner, Inc.’s …

International action against Gameover Zeus botnet and CyptoLocker ransomware

On Friday, 30 May 2014, law enforcement agencies from across the world, supported by the European Cybercrime Centre (EC3) at Europol, joined forces in a coordinated action led …

Mobile ad libraries create major risk for enterprise data

Every day at Mojave Threat Labs, our research team analyzes thousands of mobile apps using more than 200 individual risk factors. One of the key risk factors that we track is …

Why endpoint backup is critical

Enterprises are at an increasing risk for data loss due to the growing amount of company data stored on endpoints—the laptops, smartphones, tablets and other devices which …

Introducing the Security Culture Summer School

The infosec community has complained about awareness training failures and wasting time and effort on awareness trainings for quite some time. A consensus has emerged that for …

Fake Android soccer gaming apps just show ads

As the soccer world cup in Brazil is coming close, the offering of soccer-related apps on the Google Play store is big, at least 125 different vuvuzela apps are available. …

IBM eliminates fraudulent behavior in the cloud

IBM has patented a technique that helps online and cloud-based businesses improve their ability to eliminate fraud by analyzing browsing behavior to determine whether …

NIST requests comment on proposed SHA-3 cryptographic standard

The National Institute of Standards and Technology (NIST) has requested public comments on its newly proposed SHA-3 Standard, which is designed to protect the integrity of …

WatchGuard integrates wired and wireless network security

WatchGuard has announced that its UTM and NGFW appliances allow users to deploy, configure and manage both wired and wireless network security through a single device in a …

Week in review: Apple devices hijacked in blackmail scheme, inside the malware war zone, and hacking for the greater good

Here’s an overview of some of last week’s most interesting news, interviews, reports and articles: In wake of breach, eBay has to deal with multiple web …

Walking through Hack In The Box 2014 Amsterdam

This year’s Hack In The Box conference is being held at the De Beurs van Berlage, which is an impressive venue located in central Amsterdam. The organization, the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools