Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Critical Java flaw affects nearly one billion users

Researchers from Polish firm Security Explorations keep digging into Java and discovering flaws, the latest of which has been unearthed just before Oracle’s annual …

Researchers bypass NFC access control with smartphone

A security flaw in most Mifare NFC contactless cards can easily be misused by hackers to modify the contents of the cards and get free rides on at least two U.S. transit …

eIQnetworks releases next generation SIEM

eIQnetworks announced SecureVue NGS, a next-generation SIEM solution that provides log management, event management, network behavioral analysis and intelligent security …

Bogus Second Life survey leads to card info theft

Users of popular online virtual world Second Life are in danger of getting their credit card details stolen via phishing pages that supposedly offer 2500 Linden dollars …

Mobile banking trends and hidden risks

While mobile banking apps are growing quickly in popularity, 68 percent of smartphone owners who have not yet adopted these apps are holding back due to security fears, while …

Solutions for application and network performance management

AppNeta launched its unified solutions for End User Experience Monitoring including full-stack application performance tracing and network performance insight. As business …

DellKACE unveils appliance for improved endpoint security

Dell KACE unveiled the latest version of the Dell KACE K1000 Management Appliance, which includes expanded visibility into the network through support for new operating …

Top words cybercriminals use in fake emails

The top words cybercriminals use create a sense of urgency, to trick unsuspecting recipients into downloading malicious files. The top word category used to evade traditional …

Ethics of Big Data

What are your organization’s policies for generating and using huge datasets full of personal information? Ethics of Big Data examines ethical questions raised by the …

How to recognize rogue online pharmacies

As the prices of pharmaceuticals keep rising, so does the popularity of online pharmacies. Crooks noticed the high earning potential of rogue online pharmacies from the very …

Backdoor Trojan masquerading as KLM e-ticket

As many flyers tend to book their tickets online and receive them in electronic form, it’s no wonder that malware peddlers often choose to deliver their malicious wares …

Stolen card data on sale on professional-looking e-shop

The theft of debit and credit card information has become a lucrative business, but sometimes the individuals that engage in the stealing are not so eager to user the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools