Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Mac Protector: Fake AV targets Mac OS X users

A little over two weeks have passed since the appearance of MAC Defender, the fake AV solution targeting Mac users. And seeing that the approach had considerable success, it …

Insider threats plague data managers

Financial services organizations struggle with human error, abuse of privileges more than most. Application Security, Unisphere Research, and the International Sybase Users …

Microsoft Web Application Configuration Analyzer 2.0 released

Web Application Configuration Analyzer (WACA) is a tool that scans a server against a set of best practices recommended for pre-production and production servers. The list of …

A guideline for critical information infrastructure governance

ENISA launched a new publication on National Risk Management (NRM) preparedness. The report sets out the essential elements as a guideline for the governance of NRM in …

Stolen credit card numbers advertised via Twitter

You would expect online criminals to want to keep a low profile and restrict their attempts of selling stolen wares to shady online criminal forums, but every once in a while …

SpyEye Trojan attacks Verizon’s online payment page

Trusteer discovered a configuration of the SpyEye Trojan targeting Verizon’s online payment page and attempting to steal payment card information. The attack took place …

Journalist arrested for article on Facebook privacy flaw

Australian journalist Ben Grubb was arrested yesterday following the publication of an article he wrote about a demonstration of how to access Facebook photos even if they are …

Worrying trend in credit card data security

A new BitDefender study which has revealed some concerning statistics on the personal protection of credit card data. 97% of 2,210 respondents aged 18 to 65 said they …

Facebook scam uses fake YouTube CAPTCHAs

It seems sometimes that Facebook survey scams alternate between just to types of lures: “See you views your profile” and “OMG! I can’t believe …

HADOPI stops monitoring for copyright infringement due to breach

Trident Media Guard – the company tasked by the French High Authority for the Dissemination of Works and Protection of Rights on the Internet to monitor P2P networks and …

New vulnerability reporting framework

The Industry Consortium for Advancement of Security on the Internet (ICASI) published of its Common Vulnerability Reporting Framework (CVRF) Version 1.0. CVRF is an XML-based …

Microsoft Forefront Endpoint Protection 2012 Beta released

Microsoft released Forefront Endpoint Protection 2012 Beta which continues to provide proactive protection against known and unknown threats using multiple technologies in the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools