Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Security concerns limit cloud computing use in law firms

Law firm technology managers are tempering their interest in cloud computing with a heightened focus on security, according to an annual survey published in The American …

Fraud prevention and bot protection

Imperva announced the availability of SecureSphere 9.0 and introduced ThreatRadar Fraud Prevention Services and defined a new Web security architecture that not only …

Nearly 50 chemical, defense companies hit with cyber espionage attacks

Nearly 50 (and quite possibly more) companies in the chemical, defense, and other sectors have been hit with a spear phishing campaign carrying a backdoor Trojan with the …

Online social networks: Malware launch pads

With the advent of social networks, the online world has become a virtual society. Social networks serve as seamless communication channels, but at the same time they are …

How to create effective CAPTCHAs

Half a year ago, a team of researchers from Stanford University’s Security Laboratory has managed to build a computer program able to solve audio CAPTCHAs and to define …

The rising tide of portable device risks

Responding to research claiming to show that almost a third of executives have rogue mobile devices linked to their organisation’s network, Cryptzone says that this a …

Insecure devices extend shopping risks

Shopping online for the holidays is up, with a 15 point increase in the percentage of Americans who say they will spend more time shopping online than in 2010. But according …

Toolkit cracks encrypted information on iOS 5 devices

ElcomSoft updated the iOS Forensic Toolkit with iOS 5 support for recovering keychain information in iOS 5 devices. Providing near-instant forensic access to encrypted …

Secure replacement for the Certificate Authority System

Convergence is a secure replacement for the Certificate Authority System. Rather than employing a traditionally hard-coded list of immutable CAs, Convergence allows you to …

Free guide to identity theft prevention

Intersections released the second edition of the Double Trouble ebook, that serves as a guide to identity theft prevention, including real-world scenarios where identity theft …

Fake Apple notifications lead to phishing site

When changes are made to an Apple ID account, Apple sends a notification about it to the user so that he can react promptly if the changes weren’t made by him. …

Multitasking DevilRobber Trojan targets Mac OS X users

Another week, another Mac OS X Trojan spotted. Both Sophos and Intego have detected a Bitcoin-mining Trojan that also opens a backdoor into the infected system and steals …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools