Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Democratic govts not immune to censorship attempts, says Google

Judging by the numbers contained in Google’s latest bi-annual Transparency Report, governments and government officials around the world have lately been approaching the …

Unpatched Microsoft flaw actively exploited in the wild

When Microsoft released a security advisory detailing a critical flaw in Microsoft XML Core Services and its corresponding “Fix it” mitigation solution last week, …

Six arrested for peddling Android malware in Japan

Six men – among which are three IT executives – have been arrested in Japan for having allegedly used Android malware to “earn” themselves over 20 …

Increase in cyber threats and sabotage on critical infrastructure

The Pacific Northwest National Laboratory (PNNL), in conjunction with McAfee, revealed a report that fully examines the current challenges facing critical infrastructure and …

US-CERT warns of Intel CPU flaw

A flaw in Intel chips leaves users of a number or x64-based operating systems vulnerable to system hijacking, the US Computer Emergency Readiness Team warns. “Some …

Highest paying IT certifications

ISACA’s Certified Information Security Manager (CISM) and Certified in Risk and Information Systems Control (CRISC) credentials have been named two of the highest-paying …

Real life examples on hackers bypassing CAPTCHA

Computer-assisted tools and crowd sourcing can easily bypass traditional anti-spam solutions, forcing CAPTCHAs to evolve to address these techniques, according to Imperva. A …

Predicting Malicious Behavior

Predicting Malicious Behavior combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal …

Week in review: Link between Flame and Stuxnet discovered, and cracking LinkedIn passwords

Here’s an overview of some of last week’s most interesting news, reviews and articles: Lessons learned from cracking 2 million LinkedIn passwords Like everyone …

SAP security vulnerabilities, metrics and threats

A global report from ERPScan dedicated to SAP security shows various critical services exposed by 5%-25% (depending on the service) of companies that run SAP. One of the goals …

Ghost USB honeypot released

Ghost is a honeypot for malware that spreads via USB storage devices. It detects infections with such malware without the need of any further information. The honeypot …

IT leaders want greater insight

Only 44% of IT decision makers say the line levels of IT feel connected to their organization’s strategy and are empowered to execute it, according to TEKsystems. A …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools