Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Sykipot Trojan takes advantage of Adobe Reader zero-day flaw

AlienVault Labs researchers have unearthed a piece of malware that takes advantage of the recently discovered zero-day Adobe Reader flaw used for attacking defense …

Confidential data exposure in public spaces

While protecting data on computers is top of mind for everyone, most organizations are focused on conventional security technologies such as anti-virus software, personal …

Top software failures of 2011

SQS Software Quality Systems compiled a list of the worst software failures of 2011 that have damaged reputations, impacted negatively on financials and caused stress to …

Holiday travel is risky business for mobile devices

The holidays are a time for tropical getaways, traveling to Grandma’s house to see family and friends and one of the likeliest times a person will lose their mobile …

iPad 2 and $1,000 gift cards offered by scammers

Typosquatting is often-used tool by online scammers who try to take advantage of users looking for legitimate pages, and a recently spotted spam campaign is employing that …

Card info of 1m Restaurant Depot customers stolen in breach

Customers of US foodservice wholesaler Restaurant Depot and “cash and carry” chain Jetro have begun receiving letters warning them about the possibility of their …

NETGEAR router with Mac features

NETGEAR announced Wireless Extreme for Mac and PC (WNDRMAC), the company’s first home router to offer Mac-specific capabilities – including native support for …

Managing firewalls in virtual environments

AlgoSec announced the ia solution for managing firewalls in virtual environments. AlgoSec Security Management Suite simplifies hypervisor-level firewall management by …

The risks of unauthorized access

HP unveiled new global research that reports increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, …

Chrome is the most secure browser, claims new study

Microsoft’s Internet Explorer does a better job protecting systems from attackers who already have gained some degree of access than Mozilla’s Firefox, and …

2,000 live typosquatted domains discovered

Customers of major high-street brands such as Argos, Debenhams, and John Lewis are falling victim to cybercriminals that target mistyped web addresses, a technique known as …

Spam campaign bypasses Gmail filters, employs Google Docs

Every now and then, online crooks and spammers use Google Docs to host phishing forms or documents with embedded malicious links. One such spam campaign is currently …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools