Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Oil and gas infrastructure cybersecurity spending to increase

As a highly critical sector, the oil and gas infrastructure should be one of the most secure, both physically and digitally. This is not the case. A multi-billion dollar …

The effectiveness of bug bounty programs

Veracode released an infographic that examines the success of bug bounty programs. The past decade has witnessed major growth in demand for bug hunters, with online giants …

DDoS attack sizes plateau, complex multi-vector attacks on the rise

Arbor Networks released its 8th Annual Worldwide Infrastructure Security Report (WISR) offering a rare view into the most critical security challenges facing today’s …

Bogus Windows 8 activators collect users’ private info

Despite Windows 8 sales being not as good as Microsoft hoped, there is considerable interest in the new OS version. Still, not everybody wants to pay to try it out, and …

Internet-facing printers remain a huge risk

Despite repeated warnings about office and home devices being accessible from the Internet when there is no good reason for them to be, every now and then someone gets the …

Trojan stole over 16,000 Facebook credentials

ESET discovered a social engineering Trojan horse that managed to steal the login credentials of more than 16,000 Facebook users. The ‘PokerAgent’ Trojan targeted …

Google offers over $3M for breaking Chrome OS

With $3.14159 prize pool and a completely new target, Google’s Pwnium contest has become an even greater challenge for security researchers out to make a buck from their …

Cross-site scripting attacks up 160%

Each quarter, FireHost reports on the Superfecta – a group of four cyberattacks that are the most dangerous – and warns that both Cross-Site Scripting and SQL …

The dangers of third-party code for cloud security

Imperva announced a new report which examines the dangers of third-party code in cloud computing. In December 2012, a hacker breached Yahoo! with an SQL injection attack that …

48% of IT staff fear unauthorized access to virtual servers

Data security in visualized environments is often neglected by IT organizations, with 48% either reporting or suspecting unauthorized access to files on visualized servers, …

HP helps organizations define a security strategy

HP announced a new set of security services that help organizations respond to, remediate and mitigate the impact of security breaches as they occur. Security breaches are …

cPacket Networks unveils network performance and monitoring solution

cPacket Networks announced a new network performance and monitoring solution that radically simplifies the way in which cloud and data center professionals pinpoint issues. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools