Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Fake Virustotal serves malware

The reputation of VirusTotal, the well-known site that allows you to check if a suspicious file is malicious or not, is bound to be somewhat affected by the emergence of a …

Rugged and secure portable drive

Enova’s X-Wall FX provides the hardware real-time cryptographic capability to your entire SATA portable drive including SSD within a tightly integrated USB 2.0 and SATA …

Introducing SOURCE Conference Boston

SOURCE Boston is a security conference that brings security professionals and business leaders together, sails into the Boston’s Seaport Hotel April 21-23, 2010. The …

Protect every asset in the cloud infrastructure

Lieberman Software announced an enhancement to Enterprise Random Password Manager (ERPM) that now delivers fine-grain management features to protect every asset in the cloud …

Week in review: Twitter phishing, rogue software and Waledac botnet takedown

Here’s an overview of some of last week’s most interesting news and articles: 75% of organizations suffered a cyber attack 42 percent of organizations rate …

Relentlessly annoying banking Trojan

The majority of banking trojans prefers to hide in the deepest recesses of your computer and silently steal your login credentials. But CA’s researchers recently came …

SQL injection attack show-and-tell

SQL injection has, for a long time now, found its way to the top places of the list of favorite attack vectors of cyber criminals. Its popularity is, without a doubt, due to …

Microsoft cripples the Waledac botnet

A few days ago, Microsoft has requested and was granted a temporary restraining order that resulted in the takedown of 273 Internet domains that are believed to belong to …

Mobile workforce shift will cause security headache

A recent iPass report highlights the rising numbers of workers are moving to a truly mobile working environment confirms what many in the IT security industry have suspected …

Cloud based Web application security assessment

Cenzic released ClickToSecure Cloud, a self-service, completely cloud based Web application security assessment solution. With this new cloud platform, Cenzic has created open …

Pros and cons of biometric authentication

In theory, biometrics are a great way to authenticate a user: it’s impossible to lose your fingerprint (barring the most gruesome of developments), you can’t …

International Secure Systems Development Conference

The International Secure Systems Development Conference, taking place in London during May 2010, addresses the key issues around designing-in security for standard and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools