Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Changes to the Java security model

The upcoming security changes in Oracle Java address three long-standing issues with the Java security model. The most significant change is how signed applets are handled. In …

The rise of the Koobface social networking worm

A new McAfee Labs report shows a significant spike in instances of the Koobface social networking worm and a dramatic increase in spam. McAfee Labs also saw continued …

The enterprise security time bomb

Companies are at serious risk of data security breaches as 38 percent of U.S. office workers admit to storing work documents on personal cloud tools and services, according to …

Security software market grew 7.9% in 2012

Worldwide security software revenue totaled $19.2 billion in 2012, a 7.9 percent increase from 2011 revenue of $17.7 billion, according to Gartner, Inc. Gartner said that the …

Deloitte acquires Vigilant’s cyber security services business

Deloitte strengthened its cyber security capabilities today by acquiring substantially all of the assets of Vigilant, a specialist in security monitoring and cyber threat …

Questioning Google’s disclosure timeline motivations

The presence of 0-day vulnerability exploitation is often a real and considerable threat to the Internet – particularly when very popular consumer-level software is the …

Employees continue to use risky apps on mobile devices

Risky applications and business applications are being used side-by-side on devices owned by employees that are used for work, according to a survey by the SANS Institute. …

Amazon launches sign-in service

Amazon launched Login with Amazon, a new service that will enable the over 200 million active Amazon customers to securely and simply login to apps, games, and websites. …

Parents should be concerned about app security

Veracode released an infographic outlining the importance of mobile application security for children. It provides parents with tips for protecting their children, their …

ISACA releases guide for performing business-relevant assessments

Establishing confidence in IT processes and controls is important, but audit and assurance processes often represent a pain point for business partners. Their perception is …

Real-time identity alerts reduce fraud losses

Experian announced Precise IDSM Personal Protection Alerts, a product that notifies individuals in real time that their personal information is being used in an authentication …

Profiling modern hackers: Hacktivists, criminals, and cyber spies

Sun Tzu, the renowned military strategist and author of The Art of War, was known for the saying, “Know thy enemy and known thyself, and you will not be imperiled in a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools