Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
FacebookDigits phishing scam

Facebook users have lately been targeted lately by a clever phishing scam. The phishing website, whose looks evoke those of the social network, is trying to convince potential …

WordPress users under attack

WordPress-based websites have once again become the target of attacks. This time around, the hacked websites are hosted by various ISPs: DreamHost, GoDaddy, Media Temple and …

One crime syndicate responsible for most phishing attacks

A single electronic crime syndicate employing advanced malware was responsible for two-thirds of all the phishing attacks detected in the second half of 2009 — and was …

Less than half of cloud services are vetted for security

More than half of U.S. organizations are adopting cloud services, but only 47 percent of respondents believe that cloud services are evaluated for security prior to …

Stealth HD Series: USB portable security devices

MXI Security introduced the new Stealth HD Series of encrypted USB hard drives. Replacing the well-known Outbacker MXP Series, the Stealth HD Series is powered by MXI …

Filename-changing worm wiggling on P2P networks

Worms using P2P networks to propagate have one big problem: they are usually masquerading as software, key generators, or cracks, but have hard-coded file names, which means …

Network admins worry about employee use of social media

According to findings a survey of 353 network administrators by Amplitude Research, four-in-ten (40%) were either “extremely concerned” (18%) or “moderately …

ENISA maps key online security actors and strategies across Europe

A study by the European Network and Information Security Agency (ENISA) provides a 750 pages-plus overview of the status of network and information security (NIS) in 30 …

Rogue software details: Data Protection

Data Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Data …

Rootkit-based Skype worm opens backdoors

While both Yahoo! Messenger and MSN Messenger have been massively exploited by IM worms, Skype users have been less exposed to this type of e-threat. It’s true that …

Microsoft delivers two critical updates

In today’s Patch Tuesday, Microsoft delivers two security bulletins that address vulnerabilities affecting Windows, Office and Visual Basic for Applications. …

The KHOBE attack: Are all AV solutions vulnerable?

Dubbed an “8.0 earthquake for Windows desktop security software” by its creators, the KHOBE (Kernel Hook Bypassing Engine) or the argument-switch attack has been …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools