Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Cybercriminals tailoring tactics for maximum appeal

GFI Software released its report on the most prevalent threat detections encountered during January. Last month saw malware attacks targeting a wide range of potential …

Web app security scanner Netsparker 2.1 released

Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …

Building Resilient IP Networks

More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is …

Faronics Anti-Virus 3.0 released

Faronics Anti-Virus 3.0 includes Process Protection to defend against attacks at the application level, as well as an IDS that has the ability to write rules for zero day …

Chrome to stop using online checks to spot revoked certificates

Future versions of Google’s Chrome browser will no longer use online revocation checks to verify whether the HTTPS site the user wants to visit possesses a valid …

Satellite telephony encryption cracked

Satellite telephony was thought to be secure against eavesdropping. Researchers at the Horst G?¶rtz Institute for IT-Security (HGI) at the Ruhr University Bochum (RUB) have …

Trustwave revokes “MitM” certificate, vows never to issue one again

Certificate authority Trustwave has revoked a subordinate root certificate it issued to a company that allowed it to intercept their employees’ private email …

More bogus ad-serving Android apps evade Google’s Bouncer

Users searching for games on the official Android Market have lately been heavily targeted by ad-pushing scammers. First it was the fake Temple Run app, and now a string of …

How online communication connects generations

AARP and Microsoft released “Connecting Generations,” a research report that examines how people of all ages are using online communication and social networking …

Security architecture for trusted execution environments

Elliptic Technologies introduced the tVault Security Architecture – a technology that enables end-to-end security in connected devices. tVault provides robust security …

Improved data recovery from SSDs

Data recovery from new types of data storage can be extremely time-consuming because of the need to research the algorithms used to originally store the data. Previously, …

Visibility and control of cloud services

Fidelis Security Systems announced a new cloud security solution which provides necessary visibility and control to decrease risks associated with using SaaS. The solution is …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools