Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Fake scanned documents lead to Zeus infection

A new spam e-mail campaign is currently underway, and takes the form of a document scanned and sent by a Xerox WorkCentre Pro scanner: The attachment is a specially crafted …

Researcher offers free voice and text encryption app to Egyptians

The explosive situation in Egypt has mobilized many repression-hating individuals in the world to try to do something to support the country’s citizens in their efforts …

Nigerian scammers impersonate FBI agents

The so-called “Nigerian scams” have been a staple for online scammers for a while now, most of whom are located in Nigeria – ergo the name. Attempts might …

Chinese hackers behind espionage attacks hitting Western oil firms?

Hackers have targeted five international oil companies and have extracted sensitive corporate information about oil- and gas-field operations, project financing and bidding, …

What Stuxnet means for the process industry

The Stuxnet and Aurora attacks have shown us that malware development has become a professional job. These threats targeting the process industry were written by highly …

2-step authentication finally available to Google’s non-paying customers

Google’s corporate users have had the option of using two-factor (two-step) authentication for nearly five months now, and the time has finally come for non-paying …

Organizations spend 127 hours per month managing on-site security solutions

Organizations spend an average of 127 hours per month managing on-site security solutions and related problems, according to new research from Webroot. The top time thieves …

SSL certificates for Intel Core vPro processors

Entrust has added SSL certificates for Intel Core vPro processors to its large portfolio of digital certificate offerings. This new capability, core to an identity-based …

Data Breach and Encryption Handbook

Cybersecurity risks pose some of the most serious economic and national security challenges of the 21st century. A new book, Data Breach and Encryption Handbook, published by …

HBGary breach revelations and repercussions

A few days ago, the Internet group Anonymous downed security firm HBGary’s website and breached its networks, downloading a serious amount of confidential information …

Multiple vulnerabilities in Django

Vulnerabilities have been reported in Django, which can be exploited by malicious people to bypass certain security restrictions and conduct script insertion and cross-site …

Credit score checking app triggers Trojan download

The main reason people get scammed and/or their computer infected online is because they can’t contain their curiosity, and that is precisely the thing on which the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools