Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
The Computer Incident Response Planning Handbook

The Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data …

Week in review: Hidden security risks of top mobile apps, Facebook invites white hats to attack its networks

Here’s an overview of some of last week’s most interesting news, articles and reviews: Penetration testing tool masquerades as surge protector In the same way that …

Researchers beat Google’s Bouncer

When earlier this year Google introduced Bouncer – an automated app scanning service that analyzes apps by running them on Google’s cloud infrastructure and …

Facebook invites white hats to attack its corporate network

Nearly a year ago, Facebook introduced its bug bounty program, inviting security researchers to poke around the site, discover vulnerabilities that could compromise the …

Personal and financial information under attack

Cybercriminals have increased their focus in targeting individuals and organizations of all sizes to steal personal and financial information according to Trend Micro. Among …

Most users think content is more important than the device

A global F-Secure survey of broadband subscribers has identified security, privacy and issues relating to the storing and sharing of digital content as key concerns. The …

Detect and shut down rogue mobile apps

To counter the emergence of malicious and unauthorized apps appearing on mobile app stores, RSA introduced the RSA FraudAction Anti Rogue App Service designed to detect and …

Broadcom introduces 5G WiFi combo chip for smartphones

Broadcom introduced the BCM4335, the first complete 5G WiFi combo chip for smartphones, tablets, ultrabooks and other mobile devices. 5G WiFi, the 5th generation of Wi-Fi …

First holistic security platform unveiled at Black Hat

AccessData released Cyber Intelligence & Response Technology 2 (CIRT 2), a platform that integrates network and computer forensics, malware analysis, large-scale data …

GFI VIPRE Mobile Security Premium now on Android devices

In addition to securing users from more than 10,000 known Android viruses, GFI VIPRE Mobile Security Premium helps them to keep their children safe, protect personal …

Crisis OS X Trojan is an effective spy tool

The Crisis/Morcut OS X malware recently discovered via samples submitted to VirusTotal is more than just a backdoor Trojan, Sophos researchers say after analyzing it. Its …

The dangers of Java and what to do about it

Since late 2010, Java exploits have become way more popular with hackers than the Adobe-related ones. The problem with Java is not so much in the newly discovered …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools