Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
A peek into the Sykipot campaigns

The group(s) behind the massive and consistent campaigns targeting US defense contractors with the Sykipot Trojan continue their attacks unabated, reports Symantec. Its …

Multi-cloud security groups

Dome9 Security added a new capability called Dome9 Security Groups – group-based firewall policy management – to its leading cloud security management service. …

Software platform for security in industrial control systems

Industrial Defender announced its new software product purpose-built for operators of automation systems, including NERC CIP-affected power utilities. Industrial Defender …

Protecting Mac OS X from privacy threats

SecureMac.com released PrivacyScan, a utility designed for people who value privacy and want to keep their online and offline experiences private. Every time you surf the web …

Ubuntu Unleashed 2012 Edition

Ubuntu Unleashed is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been …

Malicious MIDI files lead to rootkit malware

A Windows Media remote code execution flaw that has been patched in the last Patch Tuesday is being exploited by attackers in the wild to deliver malware to the targets’ …

Web attacks peak at 38,000 an hour

Web applications are subject to business logic attacks, according to a report by Imperva. Imperva monitored and categorized attacks across the internet targeting 40 different …

PoC exploits for Linux privilege escalation bug published

The publication of proof-of-concept exploit code for a recently spotted privilege escalation flaw (CVE-2012-0056 ) in the Linux kernel has left Linux vendors scrambling to …

User error is the biggest threat on the Internet

Sophos unveiled a detailed assessment of the threat landscape – from hacktivism and online threats to mobile malware, cloud computing and social network security, as …

Compromised Tumblr accounts sporting fake Starbucks gift cards

It is a well known fact that compromised legitimate websites are often used by cyber crooks to drive traffic towards their scammy sites. The latest example of this practice …

Symantec advises customers to stop using pcAnywhere

In a perhaps not wholly unexpected move, Symantec has advised the customers of its pcAnywhere remote control application to stop using it until patches for a slew of …

Protect your online image with tips from Microsoft

In observance of Data Privacy Day 2012, Microsoft is releasing new data about consumer behaviors online and is offering guidance and tips to help people better manage their …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools