Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
The dark side of Twitter

In this video, Paul Judge, chief research officer for Barracuda Networks, talks about measuring and analyzing malicious activity on Twitter. He talks about identifying the bad …

45TB of storage in a Linux NAS

Synology released the DS1511+, a five-bay NAS will accept up to two DX510 expansion units for a total of up to 15 drives. Using 3TB drives yields up to 45TB of storage. The …

Older Facebook apps threaten your and your friends’ privacy

Facebook users that are concerned with keeping their privacy have probably become more careful with the years about adding applications to their account, since many ask access …

Execution flow-based web application testing

In this video, Rafal Los, the Security Evangelist at HP, talks about web application security testing and offers a variety of practical tips. The video was recorded at the …

Geolocation, mobile devices and Apple top the list of emerging threats

McAfee unveiled its 2011 Threat Predictions report, outlining the top threats that researchers at McAfee Labs foresee for the coming year. The list comprises 2010’s most …

Security information and event management tips

As organizations continue to collect, process and store larger amounts of data from an increasing number of sources, costs related to system and staff resources are soaring. …

The secure coding practices quick reference guide

In the video below, Keith Turpin talks about the secure coding practices quick reference guide. It’s a technology agnostic set of general software security coding …

Man makes career out of suing e-mail spammers

There may be a lot people who thought about it, but there is one who decided to actually do it – Daniel Balsam from San Francisco quit his job and started his new …

Multiple vulnerabilities in IBM Lotus Mobile Connect

A weakness and two vulnerabilities have been reported in IBM Lotus Mobile Connect, according to Secunia. These can be exploited by malicious people with physical access to …

Carders.cc, Exploit-db.org and others hacked on Christmas

Waking up on Christmas morning and finding out you’ve been hacked must be pretty annoying, and that it what happened to the administrators of Carders.cc – an …

The security landscape from 2010 to 2011

Vendor-neutral testing and certification firm ICSA Labs offers its thoughts on the security landscape spanning 2010 and 2011. Mobile security 1. While most hackers heavily …

Week in review: DDoS attacks, anti-Facebook worm and identity in the digital age

Here’s an overview of some of last week’s most interesting news, interviews, videos, reviews and articles: How to keep mobile devices secure while traveling …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools