Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Week in review: Apple devices hijacked in blackmail scheme, inside the malware war zone, and hacking for the greater good

Here’s an overview of some of last week’s most interesting news, interviews, reports and articles: In wake of breach, eBay has to deal with multiple web …

Walking through Hack In The Box 2014 Amsterdam

This year’s Hack In The Box conference is being held at the De Beurs van Berlage, which is an impressive venue located in central Amsterdam. The organization, the …

Malware creation breaks all records! 160,000 new samples every day

Malware creation has broken all records during this period, with a figure of more than 15 million new samples, and more than 160,000 new samples appearing every day, according …

Dissecting April’s malicious spam

Malicious attachments in April came disguised as e-greetings and notifications about faxes. In the case of the former, alleged Easter greetings turned out to be the …

Free mobile privacy platform unveiled

Boolean Tech announced ShieldMe, a secure and free mobile privacy platform that allows users to connect with other people without ever giving up their phone number. ShieldMe …

Healthcare industry lags in security effectiveness

BitSight analyzed Security Ratings for S&P 500 companies in four industries – finance, utilities, retail and healthcare and pharmaceuticals. The objective was to …

Misconfiguration to blame for most mobile security breaches

Nearly 2.2 billion smartphones and tablets will be sold to end users in 2014 according to Gartner, Inc. While security incidents originating from mobile devices are rare, …

Biometric tool prevents fraud

BioCatch launched its eCommerce fraud prevention solution. The new tool uses behavioral biometric analysis to detect suspicious behavior and authenticate repeat customers, …

Strategic security acquisitions: What makes sense?

Thanks to a steady stream of high-profile data breaches, a rapidly shifting threat environment, and the recent indictment of 5 members of Chinese People’s Liberation …

8 key cybersecurity deficiencies and how to combat them

While the number of cybercrime incidents and the monetary losses associated with them continue to rise, most U.S. organizations’ cybersecurity capabilities do not rival …

Employee behaviors expose organizations to insider threat

A third of UK professionals are likely to consider risky behaviors that endanger or undermine data protection. The research was conducted by OnePoll and based on surveying …

Fraud study finds MasterCard holding lowest fraud rate

2Checkout released a study of online payments fraud, based on a worldwide sample of approximately one million payment transactions tracked each quarter. Key findings: Discover …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools