Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Week in review: Rustock botnet shutdown, Etsy’s privacy snafu and the RSA hack

Here’s an overview of some of last week’s most interesting news and articles: Anti-phishing tool detects fraudulent sites by analyzing their elements A Hong Kong …

RSA breach: Reactions from the security community

RSA, the security division of EMC, has suffered a breach and data loss following an “extremely sophisticated cyber attack.” Their investigation revealed that the …

Japanese tsunami videos lead to malware

A new Japanese disaster themed campaign is doing the rounds of inboxes. The e-mails supposedly offer links to videos about “The village that escaped the tsunami”, …

Rustock botnet downed by Microsoft

As many security companies and experts noted in the last few days, the activities of the Rustock botnet came to a standstill. They speculated about the reason behind this …

RSA hacked, SecurID users possibly affected

In an open letter, Art Coviello, the executive chairman of RSA (the security division of EMC), made public the fact that the company has suffered a breach and data loss …

EMC Avamar information disclosure weakness

EMC Avamar is a backup and recovery solution that utilizes data deduplication technology to identify redundant data at the source, minimizing backup data before it is sent …

PHP 5.3.6 fixes security issues

PHP 5.3.6 focuses on improving the stability of the PHP 5.3.x branch with over 60 bug fixes, some of which are security related. Security enhancements and fixes Enforce …

Google extends SSL to developer facing APIs

Firesheep‘s authors can be the satisfied with the gradual migration towards SSL that most of the biggest social networks, search engines, online shops and others have …

Low-tech approach to ATM heist

ATM thieves in San Francisco have adopted an unusual and very low-tech way of getting their hands on some money. According to The SF Examiner, they simply glue down the …

The crucial role of crypto technologies

Crypto technologies play a crucial role in data protection and compliance activities across a wide range of industry sectors, in both private and public organizations, …

Phishing HTML attachments bypass browser detection

In the constant war that goes on between online crooks and scammers and security professionals, adaptability is a quality greatly prized by all. All of them are tied together …

Japanese “miracle survival” Youtube scam clips

Online scams taking advantage of the ongoing Japanese tragedy are popping up daily. The latest one spotted is perpetuated on YouTube, where users go to search for videos that …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools