Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Top 8 security insights for 2014

BeyondTrust’s Advanced Research labs has identified what they believe will be the top 8 pain points and “big deals” in security in 2014. Threat vectors: 2014 …

Authentication using visual codes: what can go wrong

Several password replacement schemes have been suggested that use a visual code to log in. However the visual code can often be relayed, which opens up a major vulnerability. …

IE flaw targeted in Aurora attacks still actively exploited

Regular software patching is often touted as one of the best things you can do to keep your computer safe against malware infection. Unfortunately, not all users follow that …

How effective are Android AV solutions?

As the onslaught of Android malware continues, the recently released testing results by independent IT-security institute AV-Test show that most providers of Android antivirus …

Mozilla blocks rogue add-on that made computers scan sites for flaws

A singular new botnet composed of over 12,500 infected computers has been used by its masters to effectively crowdsource the search for websites vulnerable to SQL injection …

Datacard Group to acquire Entrust

Datacard Group has entered into an agreement to acquire Entrust. The acquisition is expected to close on December 31, 2013, subject to regulatory approval and customary …

Convenience still overrides security for mobile shoppers

Despite a huge increase in shopping on mobile handsets, shoppers do not have security in place to protect the identity and credit card data stored on the devices, according to …

IBM prevents services from running compromised code

IBM inventors have patented a technique that can enable businesses to improve cloud security and support secure transactions by preventing mobile devices from accessing …

How human behavior affects malware and defense measures

Installing computer security software, updating applications regularly and making sure not to open emails from unknown senders are just a few examples of ways to reduce the …

CIOs will continue to focus on business intelligence and analytics

The CIO focus on business intelligence (BI) and analytics looks set to continue through 2017, according to Gartner. Gartner said that the benefits of fact-based …

Building an OATH-compliant authentication server for less than $100

Using a Raspberry Pi nanocomputer and the multiOTP open source library, André Liechti showcases how to how to create an OATH-compliant authentication server at PasswordsCon …

Resurgence of malware signed with stolen certificates

Since 2009, variants of the Winwebsec rogue AV family have been trying to trick users into believing their computer has been infected and into paying for …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools