Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
What Stuxnet means for the process industry

The Stuxnet and Aurora attacks have shown us that malware development has become a professional job. These threats targeting the process industry were written by highly …

Organizations spend 127 hours per month managing on-site security solutions

Organizations spend an average of 127 hours per month managing on-site security solutions and related problems, according to new research from Webroot. The top time thieves …

SSL certificates for Intel Core vPro processors

Entrust has added SSL certificates for Intel Core vPro processors to its large portfolio of digital certificate offerings. This new capability, core to an identity-based …

Data Breach and Encryption Handbook

Cybersecurity risks pose some of the most serious economic and national security challenges of the 21st century. A new book, Data Breach and Encryption Handbook, published by …

Multiple vulnerabilities in Django

Vulnerabilities have been reported in Django, which can be exploited by malicious people to bypass certain security restrictions and conduct script insertion and cross-site …

Van Gogh Museum fan page hit by Facebook scammers

The Facebook page for the Van Gogh Museum in Amsterdam has been targeted by scammers. Messages were posted on the compromised page, including links to a version of the …

IBM secures mobile and instrumented devices

IBM announced new initiatives to extend security to the growing number of mobile and instrumented devices beyond an organization’s own four walls, such as smartphones, …

Security service for Android and Symbian

The new version of F-Secure’s Protection Service for Mobile (PSM 7) enables operators to offer protection and parental control for their customers’ mobile devices. …

7 critical questions to ask before developing a social media policy

Social media disrupts the long-standing rules of business in many ways, but crafting a social media policy is premature unless the designers of the policy answer seven …

Immunet 3.0 introduces custom anti-malware signatures

Sourcefire released Immunet 3.0 which enables users to create custom anti-malware signatures for more accurate protection against targeted attacks and offers a Cloud Recall …

Network situational awareness and retro analysis

Trisul is a Linux based application that passively listens to network traffic and tracks a number of traffic metrics across all layers. It correlates these traffic metrics …

Ruby on Rails CSRF protection bypass vulnerability

There is a vulnerability in Ruby on Rails which could allow an attacker to circumvent the CSRF protection provided. The issue affects versions 2.1.0 and above and has been …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools