Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Skype users targeted with calls spreading fake AV

Showing considerable resourcefulness in their attempt to trick Internet users, fake AV peddlers have begun targeting Skype users with an unexpected call. “Attention: …

Bots troll hacker forums to discover data breaches

When talking about bots, the first thing that comes to mind is often a bad one – i.e. how cyber crooks misuse the technology to bilk Internet users out of information or …

iManager multiple vulnerabilities

Gjoko Krstic has discovered multiple vulnerabilities in iManager, which can be exploited by malicious people to conduct cross-site scripting attacks, manipulate certain data, …

Cybercriminals find new ways to disguise spam

It used to be that malicious attachments came in emails with erotic photos of girls who “want to meet you”, or “scandalous photos” of celebrities. Now, …

Securing virtual environments and reducing malware risk

Rapid7 announced that the new version of its vulnerability management solution, Nexpose 5.0, will address the complex security challenges presented by the wide scale adoption …

Pay-per-install services attempt discreet comeback

“Pay-per-install businesses can be temporarily compromised by welcome law enforcement action, but the crooks will always find a way to return,” says McAfee’s …

Con artists love social networks

Most social networks’ users are hit by online scams almost daily – whether its the ubiquitous survey scam or the “share your cell phone number, get …

New versions of Trend Micro enterprise data protection software

Trend Micro now offers completely integrated data protection for messaging and collaboration systems providing many feature advantages for security professionals. ScanMail for …

Smartphone and tablet security tips

ICSA Labs is offering a series of tips that businesses and consumers can use to protect themselves from security risks aimed at smartphones, tablets and apps. 1. Only buy apps …

Data seepage from the corporate boundary

In a growing number of cases, Internet-facing business systems do not always reflect a well maintained, up-to-date security profile, and, as one would expect they are, by …

Japanese defense contractor breached

Mitsubishi Heavy Industries has revealed that its networks have been breached in what is considered the first cyber attack to hit Japan’s defense industry. According to …

Week in review: Windows 8 security features, the end of DigiNotar and BIOS rootkit in the wild

Here’s an overview of some of last week’s most interesting news: Linux Foundation suffers security breach A few weeks after the discovery of the compromise of the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools