Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Nessus 5.0 vulnerability scanner released

Tenable Network Security announced Nessus 5.0, a vulnerability and configuration assessment solution for enterprises and security professionals. Nessus 5.0 delivers introduces …

Trend Micro secures PlayStation Vita gamers

Trend Micro extended its collaboration with Sony and is now offering two web security services – “Trend Micro Kids Safety” and “Trend Micro Web …

Web-based breach tool for healthcare IT

Healthcare has become one of the most-breached industries, placing hospitals, clinics and health plans under scrutiny of the Department of Health and Human Services (HHS) …

Secure data with cloud-based encryption

Porticor introduced its Virtual Private Data (Porticor VPD) system, a solution combining data encryption with patented key management to protect critical data in public, …

The Internet of Things: Key Applications and Protocols

The Internet of Things describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and …

The rise of information stealers and pay-per-install malware

The fastest growing malware categories in the second half of 2011 were PPI (Pay-Per-Installs) and information stealers that target user credentials enabling the theft of key …

The new and improved Kelihos botnet

As announced by Kaspersky Lab researchers and confirmed by Microsoft, the C&C and backup infrastructure of the original Kelihos/Hlux botnet is still down after their …

The escalating cost of US cybersecurity plans

When US President Barack Obama called on the Congress for laws that would protect the country’s citizens, businesses and infrastructure from various cyber threats, it …

“Facebook will end on March 15th” hoax spreading quickly

Hoaxes claiming that Facebook will shut down or stop being a free service are regularly propagated through the social network, raising panic with users who haven’t …

ISO 27001 video tutorials

One of the biggest obstacles for companies starting to implement ISO 27001 is writing various documents required by this information security standard. Information Security …

Confidential data at risk even with policies in place

Think confidential information is protected by company IT security policies? Think again. A new survey by Xerox and McAfee, reveals that more than half of employees say they …

Intel details next-generation communications platform

Intel disclosed several features for the company’s next-generation communications platform, codenamed Crystal Forest. The platform will handle data processing across the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools