Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Automated malware analysis platform

HBGary released Responder Professional 2.0, a Windows physical memory and automated malware analysis platform that analyzes all programs in memory including malware to obtain …

Beyond the cloud: Common Assurance Metric

The Common Assurance Metric (CAM) launched today is a global initiative that aims to produce objective quantifiable metrics, to assure Information Security maturity in cloud, …

Rogue software details: AntiSpyware

AntiSpyware is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Safer surfing mobile social networks

ENISA (the European Network and Information Security Agency) today presents a new report on accessing social networks over mobile phones which points out the risks and threats …

Week in review: cloud computing security, black hat hacking, identity theft

Here’s an overview of some of last week’s most interesting news, reviews and articles: Cloud computing not as safe as they want you to think Cloud computing has …

First man ever charged with hacking VoIP providers

The first individual ever charged with hacking into the networks of Voice Over Internet Protocol (VoIP) providers and reselling hacked VoIP services for a profit pleaded …

Rogue software details: GuardWWW

GuardWWW is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Microsoft plans massive Windows patch next week

Microsoft announced it will deliver 13 bulletins Tuesday, February 9, 2010. They will address 26 vulnerabilities in Windows and Office, five of which are rated critical. The …

NIST draft of smart grid cyber security strategy

The Commerce Department’s National Institute of Standards and Technology (NIST) issued the second draft of its Smart Grid Cyber Security Strategy and Requirements, which …

Windows file system exploitation at ShmooCon

At ShmooCon 2010 tomorrow, Core Security researcher Dan Crowley will demonstrate how features not widely known in Windows path and filename normalization routines cause …

Corporations should follow the goverment’s lead on attribution of cyberattacks

Many would argue, and understandably so, that government does not often provide models for corporations to follow to improve their bottom line. However, federal agencies have …

Cracking encrypted iPhone backups

iTunes routinely makes backups of iPhones and iPods being synced to it. Such backups contain a plethora of information, essentially all user-generated data from the device in …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools