Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Oracle Solaris 11 Express released

Oracle Solaris 11 Express delivers advanced Oracle Solaris features that have been in development for over five years in a production-ready package, allowing customers to …

Holiday spam e-mail runs start off

Spammers peddling fake pills, replica watches, jewelry and bags are gearing up for the approaching holidays. According to Trend Micro researchers, using the upcoming Black …

Proof-of-concept Android app reveals platform’s security bug

Angry Birds is an extremely popular mobile game that can be played on Apple, Android and Nokia mobile devices – indeed, it has been downloaded by millions of users. So, …

Half of SMBs block employee access to Facebook

Companies are becoming more vigilant when it comes to their employees’ use of social networking sites, according to Webroot. The survey of more than 1,000 businesses …

40% of all rogueware was created in 2010

PandaLabs warned that 40% of all fake antiviruses ever have been created this year. That is, ever since this type of malicious code was first reported four years ago, …

Vulnerability assessment for Microsoft SQL Azure

Sentrigo announced Repscan 4.0 which offers expanded support for cloud-based and open source database platforms, productivity enhancements for database administrators (DBAs) …

VLC 1.1.5 fixes Windows vulnerability

The VLC development team introduced VLC 1.1.5, the sixth release of the 1.1.x branch of VLC. This release focuses on minor features, bugfixes and security issues: …

Will ears replace fingerprints as a form of ID?

Fingerprint checks and iris scans may be the most popular ways of biometric identification for the time being, but it looks like they might soon be joined – if not …

Security preparations for IPv6 migration must start now

The arrival of a slew of new and upgraded operating systems, smartphones and tablets that are enabled for IPv6 has the potential to open new and unrecognized security …

Top 10 security threats for 2011

Imperva announced their predictions for the top ten security trends for 2011 which have been compiled to help IT security professionals defend their organization against the …

Lethic Trojan is back, uses same stolen digital certificate as Stuxnet

Some two months ago, the world found out about the Stuxnet – the worm that used the Windows .lnk file vulnerability in order to spread through removable drives of …

Week in review: Firesheep countermeasure tool, Facebook bug and Barracuda bug bounty program

Here’s an overview of some of last week’s most interesting news, articles and reviews: Firesheep countermeasure tool BlackSheep Zscaler researchers have created, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools