Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Chinese university tied to “APT1” army cyber unit

By now everybody in the security industry has read the Mandiant APT1 report or at least a TEXTsummary of it, and has heard the many voices of either agreement or dissent …

Fake BBC emails lead to Blackhole, Zeus

Spam emails supposedly coming from CNN and the BBC and delivering links to trending news stories have once again become the preferred way for malware peddlers to lure …

Digital cameras easily turned into spying devices, researchers prove

Users’ desire to share things online has influenced many markets, including the digital camera one. Newer cameras increasingly sport built-in Wi-Fi capabilities or allow …

Employees deliberately ignore security rules

A recent survey from Lieberman Software reveals that more than 80% of IT security professionals believe that corporate employees deliberately ignore security rules issued by …

What do users look for in a security solution?

Users are aware of the dangers in the Internet and most of them are already using a security solution, say the results of AV-Comparatives’ annual survey that polled …

Hacking for good: Kickstart a documentary about hackers in Uganda

While the information security community is largely accustomed to the term “hacking” being used to describe criminal computer activity in the mainstream media, …

Five cuffed for stealing 2M euros via e-banking hacks

Five people were arrested last week when the Slovenian police conducted a series of house searches following an investigation into an gang that was emptying business bank …

Attacking SCADA wireless systems

Leased lines are recurring costs throughout the power grid. The bottom line demands the use of wireless solutions where possible. Dare we? We already do. The video below, …

Mobile device data recoveries surge

Kroll Ontrack saw a 55 percent increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161 percent increase from 2011 to 2012. With more and more …

Fortinet to acquire Coyote Point

Fortinet has entered into a definitive merger agreement to acquire Coyote Point Systems, a privately-held provider of application delivery, load balancing and acceleration …

Week in review: Becoming a malware analyst, South Korean cyberattacks, Apple implements two-step verification for iCloud accounts

Here’s an overview of some of last week’s most interesting news, videos, podcasts, reviews and articles: Becoming a malware analyst If you’re considering a …

Apple adds two-step verification option to iCloud accounts

Apple has finally introduced a two-step verification feature that will allow its users to secure their iCloud (Apple ID) accounts, 9 to 5 Mac reports. The option is currently …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools