Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Microsoft releases two security updates

Microsoft released two security updates addressing one Critical vulnerability in Microsoft Windows and two Important vulnerabilities in Microsoft Office. MS11-035 (Windows) is …

Fake Patch Tuesday alert leads to Zeus infection

The term “Patch Tuesday” has become widely known and is so intimately tied to Microsoft that it is no wonder that malware peddlers are using it to add an aura of …

Fake AV spreading via Yahoo! Answers

From poisoned Google image search results to poisoned answers to legitimate questions on Q&A sites like Yahoo! Answers and public forums, malware peddlers are determined …

41% carry unprotected sensitive information on mobile devices

41 percent of what should be a security savvy audience are carrying sensitive information on mobile devices unprotected, according to Origin Storage. In fact, 19 percent …

Google Chrome sandbox apparently cracked

French security firm VUPEN has announced that its researchers have managed manufacture an exploit able to bypass Google Chrome’s sandbox, ASLR and DEP. It is precisely …

Cyber criminals moving operations to Canada

Cyber criminals are on the move again and, this time, Canada is the prime target. IP addresses in China and Eastern Europe are highly scrutinized and undergoing intense …

Free browser-based security assessment

Shavlik Technologies announced a new browser-based security advisory that helps identify potential security vulnerabilities on a network. Shavlik Security Advisor scans all …

Cloud-based protection for virtualized environments

Panda Security launchd Panda Virtual GateDefender Performa which delivers cloud-based protection for VMWare virtualized environments. Companies can now protect their perimeter …

Compliance is more than just cost

Compliance investments, which are basically treated only as a spending to align with compulsory regulations, when extended to all processes including privileged and super …

Sony suffers third breach, PSN still down

Sony’s troubles seem to have no end as the company confirms a third breach of their network and fails to set a date for the restoration of services. This last breach …

“Time spent on Twitter” scam spreads virally

Facebook users are already accustomed to practically daily offers of rogue apps that will supposedly show them who views their profile or allow them to use a similar feature …

Files uploaded to file hosting services accessed by malicious individuals

File hosting services such as RapidShare, FileFactory, Easyshare and others have a number of flaws that make it possible for unauthorized people to access and download files …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools