Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Amazon profiles abused by spammers and malware pushers

Experience has proven that if a site enables users to contribute content, this feature will be abused by those who want to push their own agenda – usually spammers. This …

Facebook’s recurring nuisance – the recycled scam

Every now and then, a new Facebook scam pops up that takes advantage of the users’ curiosity and lures them in by promising to allow them to view who has visited their …

Using social networks safely

Everyone uses social networks like Facebook, Twitter or LinkedIn. Although these fantastic sites do have their upside, they also open users up to more computer viruses and …

New book: Web Application Obfuscation

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take …

New consortium to improve security products

ICSA Labs has founded the Endpoint Security Consortium to help improve enterprise endpoint security products industrywide. The mission of the consortium is to create publicly …

Malicious Kodak Galleries used for serving Trojan

A variant of a highly specialized Trojan has appeared on fake sites mimicking Kodak Gallery pages, where potential victims are urged to download software that would supposedly …

Top 10 privacy issues for 2011

The prevalence of mobile devices with personally identifiable location-based information and the increasing use of social media are top concerns for 2011. With more personal …

Real-time forensic search engine

eIQnetworks launched ForensicVue, the first real-time forensic search engine to provide security analysts with the ability to search every piece of security data on their …

Government seizes 82 website domains

Seizure orders have been executed against 82 domain names of commercial websites engaged in the illegal sale and distribution of counterfeit goods and copyrighted works as …

Toshiba announces new self-encrypting drive

Toshiba announced a 7,200 RPM 2.5-inch Self-Encrypting Drive (SED) that provides government-grade AES-256 hardware encryption incorporated in the disk drive’s controller …

Ransomware abounds

Ransomware is any malware that manages to make a computer system or any of the files on it inaccessible to the user and asks him or her to pay up if they want to regain …

Organizations still fail to control USB devices

A survey has found that USB Flash drive ownership has exploded with 100% of the 229 respondents having at least one such device and more than 21% owning as many as 10 or more. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools