Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Bank changes its name, phishers smell the potential

UTI bank, one of the leading banks in India has changed its name to “Axis’. And who better than phishers know to fish in the muddy waters of confusion. Security …

Guide to Online Antivirus Solutions Part 3: Kaspersky Online Scanner

Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …

Watch out for cyber sharks – new tool for creating trojans

PandaLabs has discovered Shark 2, a tool for creating Trojans which is being distributed on several Internet forums. Its creators have launched several updates, so there are …

Zero-hour virus outbreak detection

New 5.0 version of Commtouch Enterprise Anti-Spam Gateway now includes Zero-Hour Virus Outbreak Detection to complement traditional enterprise Anti-Virus solutions and block …

First Response warns customers after data breach

Following a recent break-in at its offices, First Response has admitted the loss of storage discs containing sensitive information of its current and former customers, warning …

Malware uses Hotmail and Gmail as spam hosts

A joint effort between the BitDefender and Yahoo security teams appears to have stymied the criminals behind Trojan.Spammer.HotLan to generate and use Yahoo accounts to send …

Financial services institutions battle with data loss

New research from TowerGroup finds that businesses are not doing nearly enough to prevent the loss or theft of customers’ personal information. The pace of data loss is …

Practical tips for information protection

The new school year means new friends, new classes, and often a new computer to help get schoolwork done. Mobile computers in particular can also contribute to problems …

Compliance, IT Security and a Clear Conscience

Never has the need to prove compliance with external regulations and internal policies been more acute than it is today. The likely consequences of failing to prove that your …

Security is broken: the past, present and future

Our computer security model is broken. Worse yet, it never really has worked at all well, and is even less suitable for today’s uses. This talk explores the history …

The insecurity of Widgets

Iftach Ian Amit from Finjan explains why widgets and gadgets on various websites and platforms are inherently insecure, despite the fact that standards exist to create secure …

Step-by-step Guide to Online Amazon S3 Backups with Jungle Disk

Jungle Disk is an application that lets you store files and backup data securely to Amazon.com’s S3 Storage Service. Amazon S3 provides a simple web services interface …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools