Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Companies sever ties with HBGary

The HBGary breach and the publication of internal company documents – including the potentially damning proposal developed by HBGary, Palantir Technologies and Berico …

Hardware security modules for cryptographic protection

Thales announced that Thales nShield Solo hardware security modules (HSMs) have been integrated into Imprivata OneSign. Designed to protect cryptographic keys and sensitive …

SMS Trojan masquerading as valentine-sending mobile application

It’s Valentine’s Day, and for all of you who are getting ready to send a valentine to the special people in your life, Microsoft has a warning: be careful what …

Central management of self-encrypting hard drives

Lenovo and WinMagic announced SecureDoc for Lenovo, a full-disk encryption solution for central management of new self-encryption hard drives that meet the Opal standard …

Week in review: HBGary breach, corporate espionage and 2-step authentication by Google

Here’s an overview of some of last week’s most interesting news and articles: Hackers compromised Nasdaq’s network Hackers continue to breach systems of …

Fake scanned documents lead to Zeus infection

A new spam e-mail campaign is currently underway, and takes the form of a document scanned and sent by a Xerox WorkCentre Pro scanner: The attachment is a specially crafted …

Researcher offers free voice and text encryption app to Egyptians

The explosive situation in Egypt has mobilized many repression-hating individuals in the world to try to do something to support the country’s citizens in their efforts …

Nigerian scammers impersonate FBI agents

The so-called “Nigerian scams” have been a staple for online scammers for a while now, most of whom are located in Nigeria – ergo the name. Attempts might …

Chinese hackers behind espionage attacks hitting Western oil firms?

Hackers have targeted five international oil companies and have extracted sensitive corporate information about oil- and gas-field operations, project financing and bidding, …

What Stuxnet means for the process industry

The Stuxnet and Aurora attacks have shown us that malware development has become a professional job. These threats targeting the process industry were written by highly …

2-step authentication finally available to Google’s non-paying customers

Google’s corporate users have had the option of using two-factor (two-step) authentication for nearly five months now, and the time has finally come for non-paying …

Organizations spend 127 hours per month managing on-site security solutions

Organizations spend an average of 127 hours per month managing on-site security solutions and related problems, according to new research from Webroot. The top time thieves …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools