Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Attackers use final Lost episode to spread rogueware

PandaLabs detected the proliferation in search engines of numerous Web pages distributing the MySecurityEngine fake anti-virus. The “bait’ used in this case has …

Metasploit Framework 3.4.0 released

The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …

Sourcefire introduces their SSL Appliance

Sourcefire announced its new SSL Appliance which enables the Sourcefire intrusion prevention system (IPS) to inspect SSL-secured traffic – blocking malicious traffic …

RSA fights man-in-the-browser attacks

RSA Man-in-the-Browser Solutions is a portfolio of anti-fraud services designed to provide defense against theft of online information. It includes newly enhanced transaction …

Combat the malvertising threat

Malicious advertising, also referred to as “malvertising,” is a relatively new attack vector for cyber criminals that is quickly on the rise. With malvertising, …

Entrust SPOC ePassport released

Entrust released the Entrust SPOC ePassport solution. An important protocol developed by the European Union and the Brussels Interoperability Group (BIG), SPOC serves as the …

Malware and spam trends continue to grow

A new McAfee report uncovered that a USB worm has taken the No. 1 spot for top malware worldwide. Spam trends show that email subjects vary greatly from country to country …

Web browsers leave ‘fingerprints’ as you surf

An overwhelming majority of web browsers have unique signatures – creating identifiable “fingerprints” that could be used to track you as you surf the …

Cryptmount: Create and manage secure filing systems on Linux

Cryptmount is a utility for GNU/Linux operating systems which allows an ordinary user to mount an encrypted filing system without requiring superuser privileges. It is aimed …

Rogue software details: CyberSecurity

CyberSecurity is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\Desktop\Cyber Security.lnk Folders …

A closer look at Carbon Copy Cloner

If you care about your data, you should consider backups as essential, not just important. Apple did a lot for the average user with the introduction of Time Machine, but …

Anonymity, privacy and circumvention with Tor

Below you can watch Jake Appelbaum’s presentation from SOURCE Boston 2010.

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools