Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
Web 2.0 Architectures

What is Web 2.0? There is still no definitive and all-encompassing definition for the phenomenon, and there probably never will be. One thing that is known for sure is that it …

Is it possible for data to be both anonymous and useful?

The hoarding of data by companies is usually accompanied by the assurance that all the obvious identifiers (name, address, Social Security number) have been deleted – …

Google Book Search settlement: Will it include privacy rules?

It’s already common knowledge that Google intends to build the biggest, most comprehensive online library and bookstore there is. And maybe you’re thinking: …

A closer look at F-Secure Internet Security 2010

Following a redesign of their logo and their motto, F-Secure redesigned their Internet Security suite. F-Secure Internet Security 2010 is a security solution designed for …

7 tips for basic e-mail security

Simple to implement, these tips can be a good start to making sure your e-mail communication becomes more secure. 1. Understand that no e-mail communication is 100% secure. We …

September: Month of Facebook bugs

There is an interesting project started by a security researcher that goes by the handle theharmonyguy. Using as a inspiration the “Month of Twitter Bugs”, he …

The Bento Book: Beauty and Simplicity in Digital Organization

Bento is a database for people who need more than a spreadsheet, but less than a full-fledged complex database. It was designed with Mac users in mind, and integrates Mail, …

What do we know about the Conficker worm?

According to John Markoff, we know what the Conficker worm does and how it does it, but little else. Who made it? What purpose does or will the network of 5 million zombie …

WPA TKIP encryption cracked in a minute

Robert McMillan from IDG News Service reports that two Japanese scientist from the Hiroshima and Kobe Universities found a way to crack the WPA encryption system in wireless …

A closer look at Kaspersky Internet Security 2010

Kaspersky Internet Security is security software that offers protection against viruses, spyware, spam, identity theft and phishing. It also has parental and privacy controls. …

Most charges dropped against San Francisco’s rogue admin

A little more than a year has passed since Terry Childs has been arrested. An administrator of San Francisco’s FiberWAN network, he has been accused of four separate …

Internet vault with built-in data inheritance

DataInherit, a new online data storage service with built-in data inheritance has been offered by DSwiss AG, a Swiss bank for information assets owned partly by Avantec. …

Don't miss

Cybersecurity news