Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Malicious “Your Photos” email from fake LinkedIn users

If you receive an email seemingly coming from a LinkedIn user, asking you to open an attachment in order to see “your photos” – don’t do it! Opening …

Cloud Security Alliance released SIEM guidance

The Cloud Security Alliance (CSA) released the Security Information and Event Management (SIEM) guidance report as part of its Security as a Service (SecaaS) Implementation …

Service Bus for Windows Server released

Service Bus for Windows Server provides Windows Azure Service Bus messaging capabilities on Windows Server. It enables you to build, test, and run loosely-coupled, …

Privilege Guard 3.6 released

Avecto released Privilege Guard 3.6, which introduces a number of new features, including a challenge/response capability to easily authorize applications for remote users and …

Effective MySQL: Replication Techniques in Depth

Effective MySQL: Replication Techniques in Depth describes what is needed to understand and implement MySQL replication to build scalable solutions. This book includes …

Week in review: Windows 8 security features, weak crypto allowed spoofing emails from Google, PayPal domains

Here’s an overview of some of last week’s most interesting news and articles: Shortened .gov URLs lead to scams The fact that cyber crooks often misuse URL …

Flaw in boarding pass check system puts fliers in danger

Everybody knows by now that airline boarding passes have barcodes that, when decoded, show a series of letters and numbers that “summarize” the main information …

Software backdoor makes critical infrastructure vulnerable to attacks

Ever since Stuxnet managed to disrupt the workings of the Natanz nuclear facility, the security of industrial control systems (ICS) has deservedly received a lot of attention. …

First look at Windows 8 security features

Windows 8 launched this week. It brings a new interface, but under the hood, it introduces a number of new security features. The most significant change in terms of security …

Best practices from healthcare and compliance experts

Data breaches in healthcare are raising alarm. Nearly 20 million patient health records have been compromised in the past two years, according to the U.S. Department of Health …

Why mobile malware is big in China and Russia

According to Lookout’s State of Mobile Security Report 2012, “Toll Fraud” malware has become the most prevalent type of malware within the past year due to …

Windows 8 launch prompts thoughts on life after XP

Much has been made of the extensive changes that Microsoft has revealed around the aesthetics and performance of Windows 8, as well as the possible effects these changes will …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools