Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Man gets 309 years in prison for identity theft

Robert Thompson, the leader of a massive identity theft and bribery scheme, was sentenced to 309 years in prison based on charges of conspiracy, wire fraud, mail fraud, bank …

Video: Cyber attack simulation

In the video below you can watch CNN’s Jeanne Meserve reports on the results a staged cyber attack.

Spam recycling: Why fix it if it ain’t broken?

Why take the trouble and waste the time for writing a new email, when the first one did so well? In the latest spam campaign hitting inboxes around the world, cyber criminals …

Finalists announced for the “Most Innovative Company at RSA Conference 2010” contest

RSA Conference announced the top 10 finalists for its “Most Innovative Company at RSA Conference 2010” contest. This half-day interactive program is devoted to …

12 tips to ensure company data is kept private

Companies must consider the implications of using free communications services (such as email and data hosting) on their data privacy. Network Box offers IT managers steps to …

Mock cyber attack shows US unpreparedness

During the simulated cyber attack that took place yesterday in Washington and was recorded by the CNN, one thing became clear: the US are still not ready to deflect or …

Global network of infected devices unearthed

While working on a project for the Ministry of Defense, a team of Czech researchers has discovered a global network of virus-infected devices that makes it possible to …

Permanent Stakeholders’ Group of top security advisors appointed

As of today, a new composition of 30 top security experts start their term of office as members of the Permanent Stakeholders’ Group (PSG), giving advice to the …

Security updates for Adobe Reader and Acrobat

A critical vulnerability has been identified in Adobe Reader 9.3 for Windows, Macintosh and UNIX, Adobe Acrobat 9.3 for Windows and Macintosh, and Adobe Reader 8.2 and Acrobat …

Top 25 most dangerous programming errors

Based primarily on the CWE List and leveraging the SANS Top 20 attack vectors, the main goal of the Top 25 list is to stop vulnerabilities at the source by educating …

CORE IMPACT Pro integrates with Metasploit Project

Core Security Technologies has created a fully supported technical integration between CORE IMPACT Pro and the Metasploit open-source exploit framework. Through the …

Facebook users targeted by fake AV

Facebook users are once again in danger of getting their computers compromised as a new spamming campaign urging them to update their account agreement is currently under way. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools