Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Cloud-based tool simulates social engineering

TraceSecurity launched the TraceSecurity Phishing Simulator, a secure, cloud-based solution that allows organizations to safely perform on-demand social engineering tests that …

New IronKey secure USB flash and hard drives

Imation expanded the IronKey secure USB product line with new hardware encrypted flash and external hard disk drives. The IronKey D80 flash drives and H80 hard drives enable …

European ATM Security Team on fraud losses

European ATM Security Team (EAST) has published its first European Fraud Update for 2013. This is based on country crime updates given by representatives of 21 countries in …

Privacy-enhanced identity and authentication platform

SecureKey announced its cloud-based briidge.net identity and authentication platform – a solution that enables people to use devices and credentials they already have to …

Real-time apps and FTP are preferred malware targets

Palo Alto Networks published an analysis of new and evasive malware in live enterprise networks. Their findings show that traditional antivirus solutions are not identifying …

Targeted attacks and real world hacks

Web application attacks are the most significant security threat for IT infrastructures, according to Alert Logic. During a six-month study period, Alert Logic found that 48 …

PrivacyScan expands cleaning support for Internet and desktop apps

PrivacyScan 1.2 is now available in the Mac App Store with updated privacy cleaning features and support. PrivacyScan protects online and offline privacy by shredding files …

Digital cameras easily turned into spying devices, researchers prove

Users’ desire to share things online has influenced many markets, including the digital camera one. Newer cameras increasingly sport built-in Wi-Fi capabilities or allow …

Employees deliberately ignore security rules

A recent survey from Lieberman Software reveals that more than 80% of IT security professionals believe that corporate employees deliberately ignore security rules issued by …

Attacking SCADA wireless systems

Leased lines are recurring costs throughout the power grid. The bottom line demands the use of wireless solutions where possible. Dare we? We already do. The video below, …

Mobile device data recoveries surge

Kroll Ontrack saw a 55 percent increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161 percent increase from 2011 to 2012. With more and more …

Fortinet to acquire Coyote Point

Fortinet has entered into a definitive merger agreement to acquire Coyote Point Systems, a privately-held provider of application delivery, load balancing and acceleration …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools