Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Multiple Java versions on endpoints risky for enterprises

Java represents a significant security risk to enterprises because it is the endpoint technology most targeted by cyber attacks, show the results of Bit9 research. The …

New ReadyNAS rackmount devices from NETGEAR

NETGEAR announced ReadyNAS 3220 and ReadyNAS 4220, the latest NAS products to run on the ReadyNAS OS, introduced in March 2013. Available in 2U rackmount form with 12-bay …

Passwords of 1.8M Ubuntu Forums users compromised in hack

Ubuntuforums.org, the home of a variety of support forums dedicated to users of this popular Linux distribution, has been hacked over the weekend and defaced to show an image …

Apple developer center hacked by security researcher?

The mystery of why Apple’s Developer Center has been inaccessible for users since last Thursday has apparently been solved, as UK-based security researcher Ibrahim Balic …

Apricorn unveils FIPS 140-2 encrypted USB 3.0 drive

Apricorn debuted its Aegis Padlock Fortress, a secure drive designed specifically for the stringent requirements of the Government, Military and Healthcare. The first USB 3.0 …

BT Security CEO to keynote RSA Conference Europe 2013

RSA Conference announced BT Security CEO Mark Hughes as a keynote speaker for the 14th annual RSA Conference Europe, taking place from 29 – 31 October 2013, at Amsterdam …

Week in review: Hijacking connected cars, Android backup flaw, help desk security threats

Here’s an overview of some of last week’s most interesting news and articles: UEFI secure boot: Next generation booting or a controversial debate One of the first …

Hijacking connected cars with a $25 tool

A presentation by two Spanish researchers scheduled to take place later this month at the Black Hat conference in Las Vegas will apparently prove that hijacking modern cars …

Huawei’s Chinese connection continues to be source of suspicion

A day after it was announced that the UK government will investigate the employees at the Huawei’s Cyber Security Evaluation Center located in Banbury, Oxfordshire, …

The future of electronic payment: Smartphone authentication and facial recognition

Withdrawing cash from an ATMs by using a debit or credit card or paying with it at a point-of-sale may soon become a thing of the past, as several manufacturers have presented …

Major vulnerabilities in office security and RFID systems

At the Black Hat conference in Las Vegas, researchers will reveal critical vulnerabilities in many of the world’s most widely-used building security systems and …

ISACA updates IS Audit and Assurance Standards

ISACA has issued revised Information Systems (IS) Audit and Assurance Standards. The standards have an effective date of 1 November 2013. Introduced in 1988, the IS Audit and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools