Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Skype becomes a malware minefield

Skype users should be careful when using the service these days. First CSIS researchers unearthed a campaign misusing Skype to replicate and spread the Shylock banking Trojan …

Twitter bug gives 3rd-party apps access to users’ Direct Messages

A Twitter bug allowed third-party applications to access Direct Messages of users who signed in to the apps by using their Twitter account, reported IOActive researcher Cesar …

How to spot APT attacks

With the proliferation of Advanced Persistent Threats (APTs), it’s paramount for those who are charged with defending the systems and networks of likely targets to know …

Investigating clever scamming techniques and their evolution

Christopher Boyd is a Senior Threat Researcher for GFI Software. Chris has been credited for finding the first instance of a rogue Web browser installing without permission, …

Video: Data mining a mountain of vulnerabilities

Every day, software developers around the world, from Bangalore to Silicon Valley, churn out millions of lines of insecure code. Veracode used static binary analysis on …

Google searching for hardware alternatives to passwords

Passwords are on the way out, it seems. With current boom – and obvious success – of phishing, it’s time to see what could be a better alternative to this …

GFI EventsManager now with active monitoring

GFI Software announced that GFI EventsManager now includes the active network and server monitoring capabilities found in the NetworkServerMonitor solution. This new …

McAfee outlines the future of business security

McAfee announced its strategy for building upon Security Connected, the framework in which security products and services work together to safeguard businesses with better …

New nCircle security appliance cuts vulnerability scan time

nCircle announced the Device Profiler 4000 (DP 4000), a high performance vulnerability scanning appliance designed to support vulnerability scanning requirements including web …

Student checks software for critical bug, gets expelled from college

When 20-year-old Ahmed Al-Khabaz, a computer science student at Montreal’s Dawson College, discovered a critical flaw in his college’s student web portal, he …

What makes a good information security professional?

Information security is a very competitive industry, and one of the very few that kept doing fine even during the recession. It’s also a dynamic field that promises a …

Proposed EU cyber security law will require proactive network security

Last week, the European Commission proposed new legislation to require major tech firms like Google and Facebook to report any security breaches to local cyber crime …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools