Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
NYPD detective accused of hiring email hackers

Edwin Vargas, a detective with the New York City Police Department, has been arrested on Tuesday for computer hacking crimes. According to the complaint unsealed in Manhattan …

Experts highlight top data breach vulnerabilities

Hidden vulnerabilities lie in everyday activities that can expose personal information and lead to data breach, including buying gas with a credit card or wearing a pacemaker. …

Why BYOx is the next big concern of CISOs

Wisegate released new research from its members that demonstrate how CIOs and CISOs are working to achieve the right balance between employee productivity and information …

Free tool repairs critical Windows configuration vulnerabilities

Tripwire announced SecureCheq, a free configuration utility that helps evaluate and repair the most common, critical configuration vulnerabilities in Windows desktops and …

IT pros focus on cloud security, not hype

Cloud computing is exceeding expectations, according to a CA report. Respondents indicate the cloud has moved beyond adolescence and is on the path to maturity in the …

Blue Coat to acquire Solera Networks

Blue Coat Systems has entered into an agreement to acquire Solera Networks, a provider of big data security intelligence and analytics for threat protection. The Solera …

CISOs need to engage with the board

Cyberspace has placed information risk firmly on the boardroom agenda, and CISOs need to engage with their boards to ensure their organizations understand and manage …

Find TrueCrypt and BitLocker encrypted containers and images

Passware announced that Passware Kit Forensic 12.5 can now recognize hard disk images and containers, such as TrueCrypt, BitLocker, PGP, during a computer scan. For a computer …

Wi-Fi client security weaknesses still prevalent

Google Android, Apple iOS, BlackBerry, and Windows Mobile devices have an inherent security weakness in the method they use for connecting to Wi-Fi networks that has the …

Sourcefire goes beyond the sandbox

Sourcefire introduced malware trajectory capabilities across its Advanced Malware Protection portfolio, giving customers visibility into malware attack activity and enabling …

Digital Government Strategy progress and challenges

A new report by Mobile Work Exchange and Good Technology examines Federal agencies’ progress toward the Office of Management and Budget’s (OMB) Digital Government …

Over 45% of IT pros snitch on their colleagues

Forty five percent of IT workers admit they would snitch you up to the boss if you decide to break corporate rules or access company information that you shouldn’t on …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools