Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Attackers use smaller botnets to launch high-bandwidth attacks

DDoS perpetrators changed tactics in Q3 2013 to boost attack sizes and hide their identities, according to Prolexic. “This quarter, the major concern is that reflection …

Different adversary classes within security

Akamai Director of Security Intelligence, Josh Corman, gives an overview different adversary classes and their motivations.

Top U.S. cities for online fraud origination

ThreatMetrix announced data ranking the top U.S. cities for the origination of online fraud. The data reveals that Santa Clara, CA, is the nation’s top spot for online …

Smartphone users still unaware of identity theft threats

Four in ten (40%) smartphone users in the United States agree that they don’t understand cyber security well enough to know how to protect themselves, according to …

Video: Advanced password recovery and modern mitigation strategies

Think about all the passwords we use to access information every day. Whether it is email, social media, financial institutions or numerous other services, passwords have …

Nmap cheat sheet

Network Mapper – better known by its shortened name Nmap – is one of the most long-lived security tools out there. Used for scanning computer networks for ports, …

How to social engineer a social network

Social engineering has for a while now been cyber attackers’ best bet to enter systems and compromise accounts when actual hacking doesn’t work, or when they …

The globalization of business is increasing exposure to fraud

The number of companies falling victim to fraud has increased in the past year, according to the 2013 Kroll Global Fraud Report. Overall, 70 percent of companies were affected …

Data visualization of global DDoS attacks

Arbor Networks have collaborated with Google Ideas to create a data visualization that maps global DDoS attacks. Google Ideas – a “think/do’ tank – …

A new classification for potentially unwanted mobile apps

What are PUAs (Potentially Unwanted Applications), and how should they be classified in the mobile (specifically Android) environment? PUAs are not technically malware, and …

Higher education networks 300% more likely to contain malware

OpenDNS researchers found that higher education networks are 300 percent more likely to contain malware than their enterprise and government counterparts. The study also …

Building an information security awareness program from scratch

Most security awareness programs suck. They involve canned video presentations or someone from HR explaining computer use policies. Others are extremely expensive and beyond …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools