Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Joomla! security bypass weakness and XSS vulnerability

A weakness and a vulnerability have been reported in Joomla!, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site …

Security threats to expand in 2012

Attackers are sidestepping automated security technology and are using social engineering and data mining to orchestrate attacks against prominent individuals and their …

Top five tips to avoid bad apps

While reported mobile malware incidents are still relatively low in number, McAfee Labs is seeing significant growth in the mobile malware threat landscape. Due to the fact …

Apple OS X sandbox hole allows bypassing of restrictions

Following Apple’s announcement that all applications submitted for inclusion in the App Store will have to have sandboxing implemented starting from March 1, 2012, …

Hacked Sky News Twitter account falsely reports on Murdoch arrest

Hacking Twitter feeds of popular mainstream media outlets is a perfect way of getting your message across to or create panic among a great number of people. It has also lately …

IBM unveils mobile security service

IBM unveiled its Hosted Mobile Device Security Management service that helps organizations protect against data loss and other risks caused by device theft, unauthorized …

Week in review: Cell phone money laundering, hardware Trojans and iOS flaw that allows downloading of malicious code

Here’s an overview of some of last week’s most interesting news and articles: Browser bloat and privacy concerns An increase in browser-based bloat and malware, …

Steam server attackers grabbed passwords, credit card data

As Bethesda Software was preparing to release Skyrim, the latest installment of its mega popular Elder Scrolls series, news that the forum of Steam, the online …

100% of enterprises reported cyber attacks

Attacks are becoming more difficult to defend against and are expensive to mitigate, with traditional safeguards falling short, according to F5 Networks. With both …

Scammers sending out bogus job offers

Cyber scammers do not hesitate using every scrap of information there is on the Internet in order to gain users’ trust and misuse it for their malicious purposes. Also, …

Block cipher encryption effectively hides banking Trojan

Brazilian malware peddlers have turned to encrypting banking Trojans with block ciphers, effectively bypassing most AV software. Kaspersky Lab’s Dmitry Bestuzhev says …

Entry VPN client for Windows

NCP engineering announced Secure Entry Client 9.3, its entry VPN client for Windows which supports mobile broadband in Windows 7 and Internet Key Exchange version 2 (IKEv2). …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools