Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Detecting the DNS Changer malware

January marked half-time for the folks at the DNS Changer Working Group (DCWG) who are now running the DNS servers originally used in the Rove botnet. Ever since a …

(IN)SECURE Magazine issue 33 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 33 has been released today. Table of contents: …

Romanian hacker TinKode allegedly arrested

A 20-year old Romanian believed to be “TinKode”, the infamous hacker that has breached the systems and defaced the pages of several government organizations, has …

Defense companies persistently targeted by cyber spies

Researchers from security companies Zscaler and Seculert have issued a warning about bogus emails targeting employees of defense-related organizations around the world in …

Fake Tumblr Staff Blog offers still targeting users

A week ago, compromised Tumblr accounts were sporting fake messages from a “Tumblr Staff Blog” offering Starbucks gift cards in return for completing surveys and …

Sophos wireless access point supports 5 GHz connections

Sophos announced the Astaro AP50, its new dual-band/dual-radio capable wireless access point. The new addition to Astaro’s wireless access point family supports both …

The Tangled Web: A Guide to Securing Modern Web Applications

Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application …

Counterclank: Info-stealing Trojan or advertising tool?

A couple of days ago, Symantec has warned about Counterclank, an Android Trojan that has been unknowingly installed by users on over five million devices. This huge number was …

Law firms get hacked for deal data

A successful cooperation between a law firm and its clients depends on the firm’s ability of keeping the details of these relationships confidential – something …

Compromised WordPress sites lead to Phoenix exploit kit

Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …

Greatest risks to database security

The greatest challenge to database security may actually come from organizational issues, rather than nefarious or accidental acts, according to a survey presented by …

The state of global cyber-readiness

McAfee and the Security and Defence Agenda (SDA) revealed the findings from a report that paints a global snapshot of current thinking about the cyber-threat and the measures …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools