Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Skimming gang indicted, facing over 60 years in prison

Four people have been charged of conspiracy to commit bank fraud, conspiracy to commit access device fraud, aggravated identity theft and bank fraud in the Manhattan federal …

Bank not to blame for customer’s heavy losses from fraudulent transactions

A magistrate recommendation that is likely to become an official ruling could set a legal precedent welcome to banks all over the US, saying they are are not accountable for …

Wireshark 1.6.0 released

Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following features are new (or have been …

43% of enterprises have security issues with cloud service providers

Most enterprises face apprehension over adopting cloud computing, and with good reason: Nearly half (43 percent) of enterprise IT decision makers reported a security lapse or …

Sony Pictures warns its customers about spear phishing

Following last week’s breach executed by LulzSec, Sony Pictures has finally issued a consumer alert and seems also to have sent it to the addresses of approximately …

Concerned with the vulnerability of authentication tokens?

Since RSA has finally admitted publicly that the March breach into its systems has resulted in the compromise of their SecurID two-factor authentication tokens, organizations …

Run Nessus on your Android device

Tenable has released an Android application for its Nessus Vulnerability Scanner, enabling Nessus users to remotely connect to a Nessus server, launch scans and review reports …

Qualys recertifies its cloud computing FDCC auditing service

QualysGuard is recertified for FDCC compliance by NIST as conforming to the Security Content Automation Protocol (SCAP) and its component standards. The QualysGuard FDCC …

12 steps for surviving an OCR breach investigation

ID Experts offers 12 steps to help covered entities identify key items in their privacy and security programs that will protect the privacy of their patients before a data …

25 percent of US hackers are FBI informants

Anyone who has read Kingpin won’t be much surprised by the estimate recently made by Eric Corley, publisher of 2600: The Hacker Quarterly, who said that some 25 percent …

Security a top concern for mobile cloud-based applications

48 percent of a Vordel study respondents noted security as a top concern for connecting from mobile cloud-based applications into the organization. The security challenges …

LulzSec leaks Sony Developer source code

Nintendo has confirmed that the server configuration file published by LulzSec on Friday is the real deal, but says that that is the only thing they managed to access and that …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools