Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Fraudware virus targeting Android users in China and South East Asia

NQ Mobile has identified, “Copycat App,” a new fraudware virus threat targeting Android users in China and several countries in South East Asia. “Copycat …

WordPress security threats, protection tips and tricks

Robert Abela is a WordPress Security Professional and founder of WP White Security. In this interview he talks about the main WordPress security risks, offers tips for website …

Video: Antivirus evasion techniques

This video from DerbyCon discusses the basics of the AV evasion problem, what techniques work, which ones don’t and why. The talk has a particular focus on AV evasion as …

CipherCloud delivers searchable strong encryption

CipherCloud has delivered techniques to improve the searchability, usability and security of cloud data protected with AES 256-bit encryption. The solution also enables …

Real-time operational risk and compliance monitoring

Corvil announced a real-time general purpose risk and compliance monitoring solution for all kinds of electronic trading businesses. The solution monitors and captures all …

Video: DIY Command & Control for fun and no profit

Many security professionals have heard about Command & Control botnets, even more have been infected by them. Very few have had the opportunity to actually look inside …

Best practices for threat management

With threats of all types on the rise and increasing costs of security breaches growing (analyst approximate $840,000 per breach), enterprises are investing in numerous threat …

Internet sites “fingerprint” users by secretly collecting browser info

A group of European researchers have released the results of their research into just how many of the most visited Internet websites track users without their knowledge with …

Week in review: Dangerous vBulletin exploit in the wild, Blackhole exploit kit creator arrested

Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: How to establish trust in the cloud In order to enforce corporate …

Infographic: The nightmare of securing unstructured data

This infographic from SealPath comes with data and facts of data loss in enterprises: sources of data breaches, market trends, technologies related to data protection, etc. …

Tamper-resistant jailbreak detection from Arxan

Arxan announced new tamper-proof jailbreak detection security and environmental sensing technology. In addition to Arxan’s pre-existing Guards, which are running on over …

Yara rules for leaked KINS toolkit

Just a few days ago, the source code of the famous KINS banking Trojan was leaked. KINS aims to infect as much computers as possible in order to steal credit cards, bank …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools