Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Bitdefender unveils new generation of products

Bitdefender launched Bitdefender 2013, improving and adding a whole arsenal of features to keep users safe. Bitdefender Safepay brings online banking and shopping to a whole …

Zeus malware strain infecting 1 in 50 PCs

ThreatMetrix Labs came across a new variant of the P2P version of the Zeus Trojan. One of the main changes to this variant is the way it encrypts its configuration file …

DroidSheep: Android tool for session hijacking

DroidSheep is a simple Android tool for web session hijacking (sidejacking). It listens for HTTP packets sent via a wireless (802.11) network connection and extracts the …

MI5 describes astonishing level of cyber attacks

MI5 has admitted that it is working to counter astonishing levels of cyber-attacks on UK industry. Head of MI5, Jonathan Evans, commented that vulnerabilities on the internet …

Video: Attacking XML preprocessing

Documenting more than a year of research in XML technologies, this talk by Nicolas Grégoire at Hack in The Box 2012 Amsterdam details security implications of the XML format …

Network Forensics: Tracking Hackers Through Cyberspace

Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from …

70% of teens hide their online behavior

When it comes to using the Internet, teens are not only engaging in risky behaviors, but how they are hiding it from their parents, many of whom don’t realize they are …

Online compliance and vulnerability scanning tool

First Data Corporation announced its PCI Rapid Comply solution, an online Self-Assessment Questionnaire (SAQ) and vulnerability scanning tool that can help small to mid-sized …

Most senior managers don’t know where their data is

67% of respondents say that senior management in their organizations either don’t know where all company data resides or are not sure, according to Varonis. In addition, …

VMware Cookbook, 2nd Edition

With scores of step-by-step solutions, VMware Cookbook, 2nd Edition helps you work with VMware ESXi in a wide range of network environments. You’ll not only learn the …

Week in review: Origins of Flame revealed, Windows 8 security, and active exploitation of state-sponsored 0-day

Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Real life examples on hackers bypassing CAPTCHA …

Malware-as-a-service allows victim management

A big amount of the malware out there are RAT (Remote administration tool) samples. This is software created by people specialized on it, people that develop, improve and sell …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools