Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
How taxpayers can protect themselves against identity theft

ThreatMetrix has identified the top precautions taxpayers should take when e-filing to protect their returns against cybercriminals. According to Forbes, more than 80 percent …

AV developer Avast starts bug bounty program

Avast, the Prague-based maker of the popular eponymous AV software, has announced the introduction of a bug bounty program. Rewards are offered only for security-related bugs …

Vormetric Vault: Manage certificates, keys and security objects

Vormetric announced Vormetric Vault, an all-in-one scalable solution for protecting and managing digital certificates, encryption keys and other security objects such as …

WordPress 3.5.1 fixes 37 bugs

WordPress 3.5.1, now available for download, is a maintenance and security release for all previous versions that fixes 37 bugs. WordPress 3.5.1 also addresses the following …

Hackers the movie: A retrospective

In this lecture, Don A. Bailey will take a look back at another great milestone in information security: the movie Hackers. In this retrospective from Hack in The Box 2012, …

Week in review: Backdoors in Barracuda appliances, and what makes a good information security professional?

Here’s an overview of some of last week’s most interesting news, reviews, videos, interviews and articles: Newest Java update doesn’t fix fresh critical …

GitHub’s new search reveals passwords and private keys

GitHub, the popular online source code repository, has unveiled on Wednesday a new search infrastructure that should help coders find specific code within the millions of the …

Cutwail botnet on spam rampage, delivers Cridex worm

Since its inception some six years ago, the Cutwail / Pandex botnet experienced its fair share of setbacks, but it’s still going strong. The main reason for its …

How to avoid Facebook scams and limit the damage they make

Last week I wrote about the most common Facebook scams, the reasons why they are perpetually so successful, and what the scammers who set them up are after. Today I will …

SCADA password cracking code available

ICS-CERT has issued an alert about the existence and general availability of the proof-of-concept exploit code for a tool that can brute force passwords and thus gain access …

Create a secure browsing session on any Windows computer

Making online purchases and secure internet browsing is safer and easier than ever with the launch of Kanguru’s new Defender DualTrust, a new secure online access and …

Belkin to acquire Cisco’s home networking business

Belkin has entered into an agreement to acquire Cisco’s Home Networking Business Unit, including its products, technology, Linksys brand and employees. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools