Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Free Stuxnet removal tool

BitDefender released a free removal tool targeting all known variants of the Stuxnet worm, as well as the rootkit drivers that are used to conceal critical components of the …

Trojan overrides Firefox password-saving behavior

A curious new information-stealing Trojan that patches a core Firefox file in order to override the browser’s behavior has been discovered by Webroot researchers. Every …

Operation Payback: Anonymous group causes service interruptions

The DDoS attacks organized by the Anonymous cyber-activist group against SGAE (Spanish copyright collection society), the Spanish Culture Ministry and Promusicae, which began …

Spammers using new URL obfuscation technique

Spammers and scammers are always on the lookout for new tricks to use to bypass URL filters and deliver the links to unsuspecting victims, and lately they have discovered that …

Twitter “wrong credential combination” phishing scheme

If you have followed a link on a Twitter message from a contact that says “You have to be the first to see these new pictures!! LINK” and entered you username and …

Are computer “health certificates” the answer for the botnet problem?

Back in March, at the RSA Conference in San Francisco, Corporate Vice President for Trustworthy Computing at Microsoft Scott Charney proposed to the audience and to the world …

Infamous Canadian Pharmacy spam affiliate program shuts down

When it comes to spam, we’re all used to rising numbers – and the rising annoyance. But it seems that there could finally a reason to rejoice: it looks like …

A phishing e-mail to learn from

A phishing attempt that makes even people who are very good at spotting them pause for a moment and take a good look is a perfect example on which to learn. Ravi Dehar of …

A Guide to Kernel Exploitation

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers …

The importance of e-mail security

E-mail is exposed at various points along its transmission, via backups, by IT staff members, or during firewall inspection. And not just the text: attachments account for …

Facebook privacy changes – a missed opportunity?

Facebook announced yesterday that changes are coming soon to the Facebook interface, in particular to the ‘Groups’ system. According to CEO Mark Zuckerberg, …

The threat behind fake LinkedIn messages

Retarus sent out a warning in response to a current wave of fake contact requests via the social media platform LinkedIn. These well-simulated e-mail messages present a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools