Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Games on social networks increase spam and phishing by 50%

In order to reach high scores, social entertainment applications require users to gather a considerable number of friends and supporters to play the same game, leading to …

Wireshark 1.2.7 released

Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following bugs have been fixed: SNMPv3 Engine ID …

Advice on securing Web applications

In this podcast, Cenzic’s Mandeep Khera talks about the latest trends in Web application security. According to their latest report, 80 percent of published …

Evolving malware attack strategies exploit online user behavior

The popularity of social networking services and changes in online user behavior are driving broader attack strategies, including complex blended threats, faster malware …

Rogue software details: BraveSentry

BraveSentry is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Swiss privacy: Myth or reality?

How is privacy impacting Swiss banks? It’s time for a change according to Dr. David Costa, Professor at Robert Kennedy College who comments on Bloomberg TV.

QuickTime 7.6.6 fixes security issues

Here is the security content related to QuickTime 7.6.6, available for download here. Playing maliciously crafted audio content may lead to an unexpected application …

Unlike popular belief, short links on Twitter aren’t malicious

Twitter recently announced that it has implemented a new security system to scan all URLs posted in tweets to protect users from malicious sites. This follows a similar …

New Linksys wireless routers

Cisco unveiled a new line of Linksys wireless routers, designed to let its core audience of tech experts and enthusiasts take their home networking experience to the next …

Blackhat SEO techniques

The business of using blackhat Search Engine Optimization (SEO) techniques to impregnate legitimate sites has become a huge money-spinner for cybercriminals. Every day scores …

Social networking risks under little control

While social media is pervasive in organizations worldwide, usage has far outpaced controls, according to the latest study conducted by Palo Alto Networks. The degree of …

Beware targeted attacks around tax season

With the tax filing deadline less than three weeks away, we’re entering the busiest time of the tax season according to the IRS. Last year, almost 95 million people …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools