Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Gray Powell, the lost iPhone and malware

The story of the day is Gray Powell and the lost iPhone. I searched for him on Google and I was really surprised to see that 4 out of 10 results from Google’s first page …

Data integrity attacks a growing threat

A survey by Infosecurity Europe of 420 organizations has found that a quarter (28%) have been subject to a data integrity attacks. Of those that think that data integrity …

Splunk 4.1.1 brings 60+ fixes

Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. The following …

User access continues to be poorly managed

Findings gathered from a Ponemon Institute and Aveksa survey of 728 experienced IT practitioners at multinational corporations and government organizations show that …

Rogue software details: VirusOut

VirusOut is a rogue security application. In order to remove it, find out what folders and registry entries to look for below. Known system changes: Folders …

OWASP releases list of top 10 web application risks

Since 2003, application security researchers and experts from all over the world at the Open Web Application Security Project (OWASP) have carefully monitored the state of web …

Week in review: Apache.org hacked, Facebook ups defenses, Adobe and Microsoft patches

Here’s an overview of some of last week’s most interesting news, articles, and podcasts: Endpoint data leak prevention still a major headache More than one in …

Open authentication standards and OATH

In this podcast, Siddharth Bajaj, Principal at Verisign Labs and Chair of the Joint Coordination Committee which leads the Initiative for OATH (Open AuTHentication), talks …

GFI Backup 2010 – Business Edition released

GFI Software released GFI Backup 2010 – Business Edition, suited for IT administrators who want to create a single backup/restore task and apply it across the entire …

Nessus 4.2.2 released

The Nessus vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and …

5 ways to protect against cloud security threats

Stonesoft has identified five ways that organizations can improve cloud computing security. This announcement comes on the heels of recent research from Gartner citing that 60 …

Fireshark: Linking the malicious web

Fireshark is a tool, made up of a Firefox plugin and a set of postprocessing scripts that allows you to capture web traffic from the core of your web browser, enabling you to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools