Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
4,300+ compromised WordPress blogs poison Google Image Search results

Google Image Search has for a while now been littered with images that lure users to compromised sites that serve as doorway pages to other malicious sites. Part of the …

FBI officials become spam targets

Various government agencies and high ranking government officials have been the target of previous spam attacks. In their attempts to lure victims, criminals continue to …

Facebook mobile users get password reset option

Facebook has announced it will be adding a very welcome security feature for the 250 million users accessing the social network through their mobile devices – the …

Social networking users becoming privacy aware

A vast majority of computer users do not post vacation memories via social networks, according to a recent survey by Avira. During a June 2011 survey of its customers, …

Parental control software for smartphones

Code9 Mobile launched Code9 Mobile, a smartphone application that enables families to establish acceptable cell phone usage rules so kids learn to use their mobile devices in …

What really breaks SSL?

After years of being ignored — which is an unusual situation for the protocol that secures the Web — SSL became the focus of the interests of the security …

UK network and ISP study reveals slow speeds and geographic variance

A study by Pando Networks revealed striking disparities between the theoretical and real-world download speeds for British broadband users. By tracking the end-user speeds for …

Protecting mobile phones? Most don’t bother

Although almost a quarter of consumers (22%) have lost a mobile phone in the past, and a further 12% have had a phone stolen, 67% don’t have passwords set up on their …

TYPO3 multiple vulnerabilities

Multiple vulnerabilities have been reported in TYPO3, according to Secunia. These can be exploited by malicious users to bypass certain security restrictions, conduct script …

Thor’s Microsoft Security Bible

Thor’s Microsoft Security Bible provides a “one-stop-shop” for Microsoft-related security techniques and procedures as applied to the typical deployment of a …

Malicious fake Firefox update spam run

Fake notices about a Firefox update are again targeting the browser’s users, says Sophos. A rather plain message supposedly coming from Mozilla instructs users to follow …

Big corporations “hacked” in Defcon social engineering contest

Most of the recent high-profile cyber attacks against corporations and government organizations have one thing in common – they all started with a successful social …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools