Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
Facebook bug compromises top pages

A customer of Sendible, an online marketing service for promoting and tracking brands through the use of social media, e-mail and SMS messaging, has inadvertently discovered a …

Security vendor launches bug bounty

Barracuda Networks announced their Security Bug Bounty Program, an initiative that rewards researchers who identify and report security vulnerabilities in the company’s …

Microsoft November Patch Tuesday bottom line

In the video below, Amol Sarwate, vulnerability labs manager at Qualys discusses this month’s Microsoft Patch Tuesday release. To learn more about patching challenges …

Adobe patches Flash vulnerabilities

Critical vulnerabilities have been identified in Adobe Flash Player 10.1.85.3 and earlier versions for Windows, Macintosh, Linux, and Solaris, and Adobe Flash Player 10.1.95.1 …

New IE 0-day exploit code found in the wild

Exploit code for a previously unknown Internet Explorer zero-day vulnerability that would allow an attacker to perform a remote code execution and install malware on the …

New vulnerability impacts Internet Explorer users

Microsoft is investigating new, public reports of a vulnerability in all supported versions of Internet Explorer. The main impact of the vulnerability is remote code …

Google Android vulnerabilities

A shocking number of high-risk security flaws in Google’s Android smartphone OS have recently been discovered by security firm Coverity. “We found 88 high-risk …

New 0-day flaw in Flash Player exploited in the wild?

Bad news just keep piling on Adobe – it looks like there is a new zero-day vulnerability in their Flash Player that is being exploited in the wild. Its existence is …

iOS security loophole allows access to passcode-protected iPhone

A security hole in Apple iOS 4.1 allows anyone to bypass the passcode screen and access certain functions of the iPhone. To do that, you must hit the “Emergency …

Fabric weaves security into program code

Wouldn’t it be wonderful if we could build security into a program as it is written? This idea spurred a number of researchers from Cornell University to try and develop …

Apple resolves FaceTime security flaw

A flaw in the beta version of Apple’s FaceTime for Mac which was presented on Wednesday, has apparently allowed potential hackers to gain access to and modify a …

Most users still vulnerable to attacks that exploit Java flaw

More than a week after Oracle released a critical patch for Java, more than 68% percent of Internet users are still vulnerable to attacks that exploit these vulnerabilities, …

Don't miss

Cybersecurity news