Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Thoughts on the need for anonymity

The other day I was reading a post on BoingBoing about Anonymous getting involved in publicizing the Steubenville and Halifax rape cases, and about a protest rally they …

Application vulnerabilities still a top security concern

Respondents to a new (ISC)2 study identified application vulnerabilities as their top security concern. A significant gap persists between software developers’ …

The New Yorker launches anonymous dead-drop tool

Popular U.S. magazine The New Yorker has made available for its potential sources an anonymous dead-drop tool that allows them to send and receive messages and files to the …

Researchers reveal OpUSA attackers’ MO

Anonymous’ highly publicized Operation USA has not been the resounding success they expected it to be. Sure, the number of sites sporting a page containing messages from …

Info-stealing Dorkbot worm spreading on Facebook

The Dorkbot worm, which first appeared in 2011 and has since been spreading via removable drives, IM programs and social networks, is currently targeting Facebook users. The …

Intelligent vulnerability management from CORE Security

CORE Security launched Insight 3.0, which delivers multi-vector vulnerability assessment, asset categorization, threat simulation, penetration testing and security analytics, …

Private messages of Bloomberg clients end up online

Mere days after Bloomberg News admitted that its journalists could access some client information via the company’s financial terminals, it has been revealed that the …

Is Microsoft reading your Skype communications?

The question of whether Skype – a Microsoft subsidiary since May 2011 – allows U.S. intelligence and law enforcement agencies to access the communications …

Mobile crimeware and the global criminal marketplace

The sprawling mobile devices marketplace has spawned an industrialized mobile financial fraud plexus that today drives increasingly sophisticated criminal technical innovation …

IT security jobs: What’s in demand and how to meet it

The information security job market continues to expand. In fact, according to a report by Burning Glass Technologies, over the past five years demand for cybersecurity …

Password meters actually work

Password strength meters work, but only when users are choosing or changing passwords for “important” accounts, a group of researchers has found. They also …

Internet scams that dominated in 2012

The Internet Crime Complaint Center (IC3) released the 2012 Internet Crime Report – a summary of reported fraudulent activity in the past year. In 2012, the IC3 received …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools