Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Most companies don’t have data breach cyber insurance

Companies now rank cyber security risks as greater than natural disasters and other major business risks, according to a new Ponemon Institute study. While only 31 percent of …

Compromising Google Accounts and enterprises via flaw in Android SSO

When it comes to Android, Google has traded security for convenience, says Tripwire security researcher Craig Young. During his recent presentation at Def Con in Las Vegas, he …

Twitter turns to app-based two-factor authentication

When Twitter finally offered 2-factor authentication for its users in May, many were disappointed by the offering as its usefulness hinged on verification codes being …

Expect more Android security issues in 2013

Android vulnerabilities, increased online banking threats and availability of sophisticated, inexpensive malware toolkits are among the growing concerns cited in Trend …

IOActive launches security intelligence service

IOActive launched its new Security Intelligence Service, to help arm organizations with prioritized critical security insights based on their business. World-renowned research …

ESET Mobile Security for Android gets an update

ESET rebuilt and redesigned ESET Mobile Security for Android. The next generation mobile product offers improved scanning, Anti-Phishing module and a completely redesigned …

Dependability through Assuredness Standard released

The Open Group announces the publication of the Dependability through Assuredness Standard (O-DA), which will benefit organizations relying on complex systems to avoid or …

Cloud contracts need transparency to improve risk management

Buyers of commercial cloud services, especially software as a service (SaaS), are finding security provisions inadequate. Gartner, Inc. said SaaS contracts often have …

Researchers create DIY IDS for identifying hacked smartphones

A group of researchers from LMG Security has leveraged a Verizon Samsung femtocell – a small cellular station for extending cell phone coverage range indoors or at the …

NSA tips off law enforcement, asks them to keep the practice secret

Just days after the NYT wrote about the NSA denying other federal intelligence agencies access to their surveillance tools comes the disclosure that a US Drug Enforcement …

German Minister calls for punishment of US companies involved in NSA spying

The revelations of mass online spying by US government agencies that involved cooperation from the British and the German governments and intelligence services, as well as the …

Advice on Tor use in wake of Freedom Hosting compromise

In the wake of the discovery that someone has compromised Tor hidden services hosted by Freedom Hosting and injected malicious JavaScript aimed at de-anonymizing specific …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools