Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
MySpace attacks and malicious code

PandaLabs wrote about the appearance of several malicious codes that are using MySpace pages to spread. In some cases, these pages have not been specifically created to spread …

The threat of virus infected talking computers

If your computer starts talking to you and tells you that you are infected and your files have been deleted, it’s no joke, you have just been infected by the BotVoice.A …

Malware over real-time communications channels shows no sign of slowing

FaceTime Communications reported today that security incidents targeting public IM and P2P channels have increased by 5 percent in Q2 2007 compared with Q1 2007. In contrast, …

Easy Packet Sniffing on Mac OS X

If you have more than one workstation, you administer several machines connected to a network, or just frequently connect to various networks, sooner or later you’ll …

New Fujitsu secure 300GB 2.5″ portable external hard disk drive

Fujitsu today launched its new travel-ready and world’s highest capacity 2.5″ External Hard Disk Drive for the U.S. market. Featuring up to 300GB of storage space …

Digital trust essential to enterprise business prosperity

Since January 2005, there have been more than 150 million identity breaches in the U.S. alone, and there is a growing market exploiting online theft. The average credit card, …

Netsky.q returns to top of virus chart

NetSky.q, the all-time leader for 2004 and 2005, has returned to head the virus Top 20 for June, according to information security software vendor, Kaspersky Lab. Hot on its …

Financially motivated threats still the most frequent malware in June

According to PandaLabs, Trojans and adware accounted for 49.6% of infections detected by Panda ActiveScan in June. Trojans, which increased by 0.75% this month, caused 26.89% …

The Evolution of Self-Defense Technologies in Malware

This article explores how malware has developed self-defense techniques and how these techniques have evolved as it has become more difficult for viruses to survive. It also …

Watch out new iPhone users – anyone can listen to your voicemail

Altough this problem was found out more than a year ago, new users that are buying iPhones and migrating to AT&T/Cingular should know that their voicemails can be …

New malware exploits iPhone craze

Secure Computing warns that email spam, indicating that the recipient has won a new iPhone, is directing users to a malware hosting website. The have discovered a website that …

Apache Prefork MPM Vulnerabilities

This case study is a result of source code analysis of Apache httpd server MPM modules. The main goal of this document is to show what may be done by an attacker who has the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools