Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Developing Enterprise iOS Applications

If you plan to develop iOS applications in a corporate setting – for internal consumption or for sale to end users – you need to read this book. Veteran developer …

Fake US Airways emails lead to Zeus variant

A US Airways-themed spam campaign aiming at infecting users with a variant of the Zeus banking Trojan has been hitting inboxes for the last two weeks, says Kaspersky Lab …

UK govt to introduce new email and web usage monitoring law

The UK Conservative-Liberal Democratic Coalition government is trotting out a new version of the controversial Interception Modernisation Programme (IMP) that was proposed by …

Pastebin to speed up takedown of sensitive information

The owner of Pastebin.com, the preferred pastebin site of Anonymous-affiliated hackers, is looking to clean up the site’s image by improving detection and removal of …

New Ice malware attacking Facebook users

Trusteer researchers have discovered a new configuration of the Ice IX malware that attacks Facebook users after they have logged in to their account and steals credit card …

Sophos acquires DIALOGS to provide mobile device protection

Sophos has entered into a definitive agreement to acquire DIALOGS, a privately-held provider of mobile management solutions, headquartered in Germany. DIALOGS, a mobile device …

Mac Trojan infects machines via unpatched Java bug

Flashback Trojan variants have been targeting Mac users since September 2011, and they have gone through a variety of changes and techniques aimed at achieving its …

First 4TB enterprise hard drive

HGST introduced the first 4TB enterprise-class hard drive family, the Ultrastar 7K4000. As the only 4TB 7,200 RPM enterprise-class drive in the industry, and one with a 2.0 …

ISO 27001 implementation: How to make it easier using ISO 9001

ISO 27001 and ISO 9001 may seem like quite different standards, but when you take a closer look at both, you can find a lot of similarities. They have the same …

Top concern? Mobile device vulnerability management

Mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months, according to Tenable Network Security. According to the study, …

New SDKs for biometric identification and object recognition

Neurotechnology released new versions of the company’s product line of SDKs for biometric fingerprint, face, iris and voice identification and object recognition. The …

A walk through the expo at InfoSec World 2012

Taking place right now in Orlando, Florida, is InfoSec World Conference & Expo 2012, and Help Net Security is on-site. Here’s a peek at the show floor featuring …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools