Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Metasploit Framework 3.3.3 comes with exploit rankings

The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …

Credit card provider suffers breach, personal data lost

MBNA, the UK’s largest credit card provider, has confirmed that a laptop containing the personal details of its customers has been stolen from one of its third party …

Is code auditing of open source apps necessary before deployment?

Following Sun Microsystems’ decision to release a raft of open source applications to support its secure cloud computing strategy, companies may be wondering if they …

FBI estimates losses of over $150 million to rogue anti-virus

Tthe Internet Crime Complaint Center, a partnership between the FBI and the National White Collar Crime Center (NW3C), reported that “the FBI is aware of an estimated …

Rogue software details: DataDoctor2010

DataDoctor2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

2010 data security trends: External attacks from the inside

Sentrigo announced its top data security trends to watch for in 2010. A new type of threat: External attacks from the inside Generally, companies have viewed attacks as either …

GnuPG 2.0.14 released

The GNU Privacy Guard (GnuPG) is GNU’s tool for secure communication and data storage. It can be used to encrypt data, create digital signatures, help authenticating …

Rogue software details: SecurityCentral

SecurityCentral is a rogue security application. In order to remove it, find out what files and registry entries to look for below. SecurityCentral will prevent execution of …

Adobe patches Flash Media Server

Critical vulnerabilities have been identified in Adobe Flash Media Server (FMS) 3.5.2 and earlier versions. The vulnerabilities could allow an attacker, who successfully …

Intel patches flaws in its Trusted Execution Technology

Invisible Things Lab – who specialize in system-level security – issued yesterday the results of their research in which they describe how flaws in Intel’s …

Tripwire’s top 5 IT security predictions for 2010

With increasingly stringent compliance mandates, the explosion in virtualization interest and adoption, demands for audit reporting, and a spike in security breaches, 2009 has …

7 smartphone security tips

Lookout, a mobile security startup, suggests seven tips to staying safe on your smartphone. Whether you use your smartphone for business or pleasure, securing the computer in …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools