Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Four information management roles IT departments need

Gartner has identified four information-management roles that IT departments need to establish and recruit from outside the IT team in a major trend that will affect both IT …

Identity theft in focus

The stories are all too familiar: Money siphoned from a checking account. Unfamiliar charges racked up on a credit card bill. Discovering a loan has been taken out under false …

Week in review: Google and Adobe hacked by China, threats 2.0 and rogue Android applications

Here’s an overview of some of last week’s most interesting news and articles: Pay by password Verotel announced Verotel QuickCharge – a new tool for Internet …

8,378 reasons for better banking security

Reports that the Suffolk County Bank – a subsidiary of Suffolk Bancorp, the US financial institution – had its banking servers hacked last November were met with …

Attackers exploiting unpatched vulnerability in Internet Explorer

Microsoft is investigating a report of a publicly exploited vulnerability in Internet Explorer. There are active attacks attempting to use this vulnerability against Internet …

Top 3 tips for virtual infrastructure protection

Flexible infrastructure If you already have a disaster recovery solution in place make sure that it is flexible enough to be used for physical and virtual server platforms. …

Mobile security market to exceed $4 billion by 2014

Strong enterprise demand for data security is driving rapid growth in mobile device management services. According to a study by ABI Research, the number of smartphones …

Top 10 information security threats for 2010

“The start of a new year is a great time for companies to evaluate their information security practices and begin thinking about what threats they’ll be facing in …

Continuing evolution of Internet threats

Spammers continue to be cutting-edge marketers, this time taking advantage of the reputations of global brands, such as UPS, DHL and Facebook, to prompt opening of emails. …

Chinese attacks gear Google to focus on security and privacy

Google acted correctly in ending self-censorship of its Chinese search engine, Google.cn, but the cyber attacks that prompted the decision demonstrate the company must give …

New CRISC certification for risk professionals

The Certified in Risk and Information Systems Control (CRISC) designation from ISACA is for IT professionals who identify and manage risks through the development, …

Adobe fixes critical vulnerabilities in Adobe Reader and Acrobat

Critical vulnerabilities have been identified in Adobe Reader 9.2 and Acrobat 9.2 for Windows, Macintosh and UNIX, and Adobe Reader 8.1.7 and Acrobat 8.1.7 for Windows and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools