Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Stealth HD Series: USB portable security devices

MXI Security introduced the new Stealth HD Series of encrypted USB hard drives. Replacing the well-known Outbacker MXP Series, the Stealth HD Series is powered by MXI …

Filename-changing worm wiggling on P2P networks

Worms using P2P networks to propagate have one big problem: they are usually masquerading as software, key generators, or cracks, but have hard-coded file names, which means …

Network admins worry about employee use of social media

According to findings a survey of 353 network administrators by Amplitude Research, four-in-ten (40%) were either “extremely concerned” (18%) or “moderately …

ENISA maps key online security actors and strategies across Europe

A study by the European Network and Information Security Agency (ENISA) provides a 750 pages-plus overview of the status of network and information security (NIS) in 30 …

Rogue software details: Data Protection

Data Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Data …

Rootkit-based Skype worm opens backdoors

While both Yahoo! Messenger and MSN Messenger have been massively exploited by IM worms, Skype users have been less exposed to this type of e-threat. It’s true that …

Microsoft delivers two critical updates

In today’s Patch Tuesday, Microsoft delivers two security bulletins that address vulnerabilities affecting Windows, Office and Visual Basic for Applications. …

The KHOBE attack: Are all AV solutions vulnerable?

Dubbed an “8.0 earthquake for Windows desktop security software” by its creators, the KHOBE (Kernel Hook Bypassing Engine) or the argument-switch attack has been …

Anti-Phishing Phyllis training game

Wombat Security Technologies announced the release of Anti-Phishing Phyllis, a training game to teach employees and customers how to spot fraudulent emails. In this training …

Security hole in Yelp Instant Personalization

A never-ending string of privacy glitches and bugs has struck Facebook since the implementation of its highly controversial Instant Personalization feature. This latest …

Xplico: Network forensic analysis tool

Xplico is an open source Network Forensic Analysis Tool. Its goal is to extract from an Internet traffic capture the applications data contained. From a pcap file Xplico …

New model for cloud-based security from Verizon Business

Verizon Business unveiled a new global, cloud-based SaaS portfolio that offers enterprises the ability to add security services and avoid purchasing expensive equipment. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools