Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Real-life consequences for choosing convenience over security

Despite being aware of security threats, the risky online behavior of young adults can negatively affect their future career prospects and financial standings, while leaving …

Stop man-in-the-browser attacks with Entrust IdentityGuard Mobile

As man-in-the-browser attacks continue to siphon funds from unsuspecting businesses and consumers, Entrust delivers a new authentication method for smartphones. Entrust …

100 potential attacks per second blocked in 2009

Symantec released its new security threat report which highlights key trends in cybercrime from Jan.1, 2009 to Dec. 31, 2009. In a year bookended by two very prominent cyber …

20 critical controls interactive from SANS

The SANS Institute released its 20 Critical Security Controls online interactive, a platform built to simplify the controls and let users choose how to consume them. The …

ESET Remote Administrator 4 released

ESET announced availability of ESET Remote Administrator 4 which simplifies the deploymen and management of ESET business solutions. Key features and benefits include: …

Phishing student loans’ pages target students

University students in the UK that have taken out a loan with the Student Loans Company have lately been targeted by a phishing scam that presents to them a page that is …

Gray Powell, the lost iPhone and malware

The story of the day is Gray Powell and the lost iPhone. I searched for him on Google and I was really surprised to see that 4 out of 10 results from Google’s first page …

Data integrity attacks a growing threat

A survey by Infosecurity Europe of 420 organizations has found that a quarter (28%) have been subject to a data integrity attacks. Of those that think that data integrity …

Network Solutions customers targeted by new hack attack

Only a week after a number of blogs hosted on Network Solutions have been compromised thanks to a WordPress hack, the company has been thrust back into the spotlight by a …

Splunk 4.1.1 brings 60+ fixes

Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. The following …

User access continues to be poorly managed

Findings gathered from a Ponemon Institute and Aveksa survey of 728 experienced IT practitioners at multinational corporations and government organizations show that …

Iceland volcano search results lead to fake AV

Eyjafj?¶ll, Eyjafjallaj?¶kull, Eyjafjalla, Eyjafjallajokull-¦ The Iceland volcano Eyjafjallaj?¶kull has been recently referred to by all those names in various media, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools