Please turn on your JavaScript for this page to function normally.
Thwarting attacks with genetically-inspired computer configuration systems

In the seemingly unending search for computer security solutions that are both reactive and proactive, researchers have occasionally turned to other sciences for ideas. In …

Horde FTP server hacked, files modified to include backdoor

The developers of the Horde open source software have issued a statement warning its users that a one of their FTP servers was discovered to have been breached and some files …

MasterCard and Silver Tail Systems combat online fraud

MasterCard and Silver Tail System announced a relationship that will enable merchants to differentiate fraudsters from legitimate consumers in real-time during the online …

Hungarian sentenced for hacking, blackmailing Marriot

Attila Nemeth, a 26-year-old Hungarian national who tried to blackmail Marriot International into giving him a job by stealing the company’s internal documents and …

VeriSign hack: Reactions from the security community

VeriSign admitted it was hacked in 2010 and cannot identify what data was stolen. Below are comments on the situation that Help Net Security received from industry veterans. …

Romanian hacker TinKode allegedly arrested

A 20-year old Romanian believed to be “TinKode”, the infamous hacker that has breached the systems and defaced the pages of several government organizations, has …

Defense companies persistently targeted by cyber spies

Researchers from security companies Zscaler and Seculert have issued a warning about bogus emails targeting employees of defense-related organizations around the world in …

Compromised WordPress sites lead to Phoenix exploit kit

Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …

The state of global cyber-readiness

McAfee and the Security and Defence Agenda (SDA) revealed the findings from a report that paints a global snapshot of current thinking about the cyber-threat and the measures …

Web attacks peak at 38,000 an hour

Web applications are subject to business logic attacks, according to a report by Imperva. Imperva monitored and categorized attacks across the internet targeting 40 different …

Criminals stole $3.4B from online revenues in 2011

Merchants are making gains against fraud but the battle continues, according to CyberSource, a Visa company. The fraud rate by order (the percentage of orders that turned out …

Leading CSOs outline roadmap to combat advanced threats

RSA released new insights from a group of the world’s leading CSOs, designed to help corporations and governments improve visibility into advanced threats ranging from …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools