Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Security complexity and internal breaches are key concerns

Growth in external hacking attempts, DDoS and malware attacks, and internal threats to data are the key security concerns for UK businesses. 64% of respondents to a Check …

FTC crackdown on “free gift card” scammers

The FTC has moved to shut down an international network of scammers that sent millions of unwanted text messages to consumers, using the lure of “free” gift cards …

Sharp increase in blended, automated attacks

FireHost announced its latest web application attack statistics, which track the prevalence of four distinct types of cyberattacks that pose the most serious threat to …

Norman Shark updates Malware Analyzer G2

Norman Shark announced Malware Analyzer G2 (MAG2) 4.0, which provides hybrid analysis, and Network Threat Discovery (NTD) 5.1, a cyberattack discovery system that …

nPulse updates its flow and packet capture appliance

nPulse released a new version of its Capture Probe eXtreme (CPX) flow and packet capture appliance, which provides a packet indexing solution at 30 million packets per second. …

Hijacking ships and planes with cheap GPS spoofers and laptops

After demonstrating a successful GPS spoofing attack against a drone (UAV – unmanned aerial vehicle) last June, Cockrell School of Engineering Assistant Professor Todd …

Apple Dev Center partially back online, still no details about the hack

Parts of the Apple Developer Center are back online after a week long outage caused by an unnamed intruder that has “attempted to secure” personal information of …

Pinterest joins Twitter in supporting Do No Track

Pinterest, the popular pinboard-style photo-sharing website, has announced a couple of big changes, and among them is the Do Not Track (DNT) feature. “We want you to …

To achieve good security, you need to focus on business

In September 2001, as the Nimda computer worm devastated networks worldwide, we in IT security thought that the management will finally wake up and see how important it was to …

The future of phishing: Credit card redirection

Cyber crooks will go at great lengths to get their hand on users’ credit and debit card information. Usually they try to trick them with spoofed emails that lead to …

The scary implications of Google Glass

Google Glass, for all its promise, has some scary implications. Here is my list of potential challenges we face with Glass: User experience Social awkwardness Privacy (or lack …

Video: Hackers for hire

Hackers are the 21st century warriors who worry many. As everything we use becomes increasingly connected, so their opportunities to hack, divert or destroy increase. NATO …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools