Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Android malware masquerading as legitimate AV apps

If you’re an Android user, you probably couldn’t help but notice the hundreds of articles about the proliferation of malware created specifically for that …

Apple, Amazon change their security policies following epic hack

In the aftermath of the spectacular hack that left former Gizmodo employee Mat Honan without access to his Twitter account, his Gmail, his iCloud account and with his iPhone, …

Beware of “Free Apple Product” SMS messages

Given the all-around popularity of various Apple devices, it’s no wonder scammers often “offer” them as prizes in bogus contests and lotteries. The latest of …

Trend Micro unleashes big data analytics

Trend Micro announced an expansion of the Trend Micro Smart Protection Network, the cloud-based security infrastructure that powers most of the company’s products and …

SignatureLink introduces all-in-one ecommerce fraud solution

Until now, ecommerce fraud solutions accomplished one objective: screen out online payment fraud based on site visitor behaviors, devices, and other criteria. The …

Alert Logic launches SaaS web application firewall

Alert Logic announced the availability of Alert Logic Web Security Manager with ActiveWatch to protect web applications against threats and attacks. The solution combines WAF …

Iran government systems to be taken off the Internet for protection

Remember when Iran expressed its intention of setting up a national Internet disconnected from the World Wide Web in order to keep its citizens safe from Western ideas and …

Reuters hack was due to old WordPress version

While the individuals responsible for the recent hijacking of Reuters’ blogging platform and one of its Twitter accounts are still unknown, it has emerged that the …

Gizmodo hack reveals worrying flaws in data management policies

Mat Honan, the former Gizmodo employee who’s personal Twitter account compromise resulted in the temporary hijacking of the tech blog’s Twitter account, has …

Threats and protection issues of cloud data

Eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to a global study of 4,000 …

Quantum cryptography theory has a proven security defect

Researchers at Tamagawa University, Quantum ICT Research Institute, announced today that they had proved the incompleteness and limit of the security theory in quantum key …

Employees targeted with faked emails from payroll services firms

Administrators at companies that outsourced payroll management to outside firms have recently been heavily targeted with malicious emails supposedly coming from those very …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools