Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Biometric protection for Mac

UPEK just launched Protector Suite for Mac, software that allows Mac users to increase both security and convenience with the simple swipe of their unique finger. Protector …

Linux Administration Handbook (2nd Edition)

This 1000+ pages guide is concentrated on one sole thing - expanding and upgrading your knowledge on administration of different Linux operating systems. As with this kind of …

Extremely convincing phishing attack

Netcrafty reported an extremely convincing phishing attack that is using a cross-site scripting vulnerability on an Italian Bank’s own website to attempt to steal …

New Quicktime Player security problems

Security researcher Luigi Auriemma found a new remote buffer overflow in Quicktime Player.

Most Oracle database pros ignore security patches

A survery by Sentrigo indicates that most Oracle database administrators do not apply the Critical Patch Updates (CPUs) that Oracle issues on a quarterly basis. Oracle …

Windows Vista SP1 RC Refresh ready for download

Windows Vista Service Pack 1 RC Refresh is available for download. This is pre-release software for individuals, organizations, and technical enthusiasts who are comfortable …

U.S. Department of Homeland Security releases REAL ID regulation

The U.S. Department of Homeland Security (DHS) announced today a final rule establishing minimum security standards for state-issued drivers’ licenses and identification …

Colombian pleads guilty in complex computer fraud scheme

A Colombian citizen pled guilty today to a 16-count indictment involving a complex computer fraud scheme victimizing over 600 people. According to the indictment, Mario …

Information security management still number one concern

Information Security Management will be the most important initiative affecting IT strategy, investment and implementation in business organizations over the next 12-18 …

Trojans that use a new form of attack with rootkits

PandaLabs has detected the appearance of Trojans that include rootkits (MBRtool.A, MBRtool.B, MBRtool.C, etc.) designed to replace the master boot record (MBR), -the first or …

Watch the trailer for “The New Face of Cybercrime” documentary

Security vendor Fortify Software will soon be premiering their documentary “The New Face of Cybercrime”. Follow the link provided above for registering to San …

Removal tool for DNSChanger Mac trojan

DNSChanger Removal Tool detects and removes latest spyware targeting Mac OS X. DNSChanger Trojan (also known as OSX.RSPlug.A Trojan Horse) attacks users attempting to play a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools