Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Can mobile malware be activated via sensors?

Can mobile malware be activated via sensors available on current mobile devices, and receive commands through out-of-band communication methods? If you ask a group of …

How secure is quantum cryptography?

Quantum communication systems offer the promise of virtually unbreakable encryption. Unlike classical encryption, which is used to send secure data over networks today and …

U.S. weapons systems designs reportedly stolen by hackers

Hackers – more than likely Chinese – have stolen designs for two dozen U.S. weapons systems during a series of raids, a previously undisclosed section of a report …

Brazilian govt sites found serving malware

Cyber crooks targeting Brazilian users have a well-documented predilection for banking Trojans, but every now and then they opt for other types of malware. Trend Micro …

DNS anomaly detection: Defend against sophisticated malware

Not so long ago, the standard way of looking for a malware infection was to simply monitor web traffic. By looking, for example, for HTTP requests to google.com/webhp – …

Liberty Reserve founder arrested, site and service inaccessible

When the website of Liberty Reserve, a Costa Rica-based payment processor popular with cyber criminals, became inaccessible late last week, speculation about what caused were …

Week in review: Scanner that identifies malware strains, Twitter offers 2FA

Here’s an overview of some of last week’s most interesting news, reviews and articles: The CSO perspective on healthcare security and compliance Randall Gamby is …

Scanner identifies malware strains, could be future of AV

When it comes to spotting malware, signature-based detection, heuristics and cloud-based recognition and information sharing used by many antivirus solutions today work well …

Killer apps: The performance of networked applications

Ipanema Technologies and Easynet Global Services unveiled the results of Killer Apps 2013, a major study into the performance of networked applications. Networking budgets are …

Zeus variants are back with a vengeance

After analyzing the feedback from the company’s Smart Protection Network, Trend Micro researchers have noted an upswing in attempted Zeus / Zbot Trojan infections. After …

Google set to upgrade its SSL certs

As a fine example of proactive security, Google has announced that it will be upgrading its SSL certificates to 2048-bit keys by the end of 2013. “We will begin …

Fighting cybercrime is on the right track

Despite the numerous security incidents that took place during the first quarter of the year, the fight against cyber-crime is on the right track, according to PandaLabs. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools