Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Ten cyber shopping tips

Safeguarding one’s online identity is even easier this holiday season with the addition of new mobile and iPad applications that allow you to check your balances while …

Turn smartphones into mobile security systems

StreetSafe is a mobile personal security system that combines wireless networks with GPS technologies and a safety network and database. “StreetSafe is accessible …

The most vulnerable smartphones

Bit9 highlighted the most vulnerable popular smartphones in use today. The devices on the list pose the most serious security and privacy risk to consumers and corporations. …

Does risk outweigh the benefits from the cloud?

Cloud computing provides organizations with an alternative way of obtaining IT services and offers many benefits including increased flexibility as well as cost reduction. …

Android officially the primary target for new mobile malware

The Android mobile operating system solidified its lead as the primary target for new mobile malware, according to McAfee. The amount of malware targeted at Android devices …

IT security budgets set by U.S. federal agencies

A new IDC Government Insights report examines IT security budgets set by each U.S. federal agency and reveals how much each organization actually spends on security-focused …

Why SMBs are attractive to hackers

A Symantec global survey of nearly 2,000 SMBs showed that 50% did not consider themselves an attack target. However, looking at today’s threat landscape, this is clearly …

Secure practices for online shopping

As we prepare for Cyber Monday and a holiday season of increased online shopping, NCSA advises that everyone take a moment to practice safe cyber behaviors. These simple steps …

Week in review: Apple OS X sandbox hole, hiding messages in VoIP packets and U.S. water utility attack

Here’s an overview of some of last week’s most interesting news, podcasts, interviews and reviews Apple OS X sandbox hole allows bypassing of restrictions …

Cybercriminals to turn mobile phones into ATMs

With all of the crazy 2011 security breaches, exploits and notorious hacks, what can we expect for 2012? Researchers of the Websense Security Labs provide their top …

Most popular prohibited IT activities in the workplace

In spite of the fact that 74% of the interviewed IT professionals have already misused the company’s IT system, and could have lost their job, if a video recording could …

Tips for secure mobile payments

With the increased use of mobile devices to pay for goods and services, traditional wallets with cash and credit cards could one day be obsolete. A new ISACA white paper …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools