Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Lock Down Your Mac with DoorStop X

When it comes to security, Mac OS X has proved on numerous occasions that it is quite safe, right out of the box. However, that doesn’t mean it cannot use additional …

A closer look at Tor privacy tool

Tor is a tool that can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. This is a graphical …

Fast-moving web threat spreads around the world

Security researchers at Trend Micro reported an accelerating infection in Italy of seemingly legitimate web pages loaded with malicious code that could plant a keylogger to …

Monitoring all local and privileged user access to database

Tizor Systems announced Mantra V5.4 with Enterprise Local Audit Architecture, the most complete solution for monitoring all local and privileged user access to databases. …

Interview with Joanna Rutkowska, security researcher

Joanna Rutkowska is primarily known for her contributions to Windows Vista backdoor installation and hiding techniques. She is very interested in stealth technology as used by …

Hedgehog database security and insider threat prevention solution

Sentrigo announced the general availability of Hedgehog, product specifically designed to combat data breaches caused by insiders with access privileges—including employees, …

New ASUS notebooks with biometric fingerprint sensors

AuthenTec announced that its AES1610 fingerprint sensors are standard in more than a dozen new 2007 Windows Vista-model ASUS notebooks. Bundled with the Trusted Platform …

Counting the Cost of Cyber Crime

It has been a busy month in cyberspace. TJX, the massive worldwide fashion retailer, is finally releasing some of the gory details of the recent hack which saw over 45 million …

Watch out for .hk domains with embedded malware code

ISC handler Maarten Van Horenbeeck writes that many valued contributors wrote in yesterday with various spam messages that contained nothing but a short piece of text and a …

Trojan horse allows attacker connect to Internet through your computer

A malware named Trojan-Proxy.Win32.Agent.y is on the prowl and like other members of its family, this one too facilitates a remote attacker to access the Internet via a …

This week’s top malware: “YouTube” and Dotex worms

This week’s PandaLabs report looks at two very dangerous worms: Dotex.A and SpreadBanker.A, as well as the six security patches published by Microsoft to fix up to …

New AI-based security data and log analyzer

Privacyware has released Adaptive Security Analyzer 2.0 (ASA), a software solution that helps system administrators and security and compliance personnel detect, understand …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools