Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
IT professionals don’t use Facebook for work

79 percent of IT professionals use social networking sites such as Facebook and YouTube, while the rest do not use social networking sites at all, according to a recent …

Largest security conference and hands-on training in India

Securitybyte and OWASP India are hosting India’s largest information security event in New Delhi at the Crowne Plaza Hotel on Nov 17th – Nov 20th 2009. The …

Ask the social engineer: Practice

One reader wrote in asking: “How can one practice social engineering before using it in the wild?” Answering is Chris “loganWHD” Hadnagy, the lead …

Embracing tokenization: Payment without pain

Today, it’s expected that merchants accept electronic payments. It’s more than expected that those payments are secure. No data leaks or breaches of any kind. The …

Discover security flaws in source code with Graudit

Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep. Graudit supports scanning code …

Find potential exploit conditions in Microsoft Office documents

OfficeCat is a command line utility developed by the Sourcefire VRT that can be used to process Microsoft Office Documents to determine the presence of potential exploit …

Trojans dominate BitDefender’s top 10 e-threats list

The top spot on BitDefender’s top 10 e-threats list for October is once again Trojan.Clicker.CM, which is mostly present on websites hosting illegal applications such as …

Top causes of identity fraud

Identity fraud increased substantially in 2008, reversing a four-year trend of decreasing incidents. Researchers say identity fraud increased by 22 percent last year and they …

Global security best practices

The latest Microsoft Security Intelligence Report shares security best practices from countries that have consistently exhibited low malware infection. These best practices …

Worm infections in the enterprise rose by nearly 100%

The latest Microsoft Security Intelligence Report (SIRv7), which indicates that worm infections in the enterprise rose by nearly 100 percent during the first half of 2009 over …

Record levels of spam, malware and Web-based threats

The number of new file-sharing sites hosting unauthorized, copyrighted content skyrocketed over the last three months, according to McAfee’s latest report. It also shows …

Week in review: Malicious email attachments, phishing trends, China’s cyber army and Halloween attacks

Here is an overview of some of last week’s most interesting news, interviews and articles: Q&A: Malware threats, Windows 7 and cyber crime Bo Olsen is a malware …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools