Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Building secure web mashups

In this video from OWASP AppSec Research 2010, you can learn more about building secure web mashups.

Fake surveys harvest personal information

Gifts are often used as an incentive to make people share their personal information. Way back in the day, people could be convinced to share their password in return for a …

HP CloudStart: Fast track private clouds

HP CloudStart is an all-in-one solution for deploying an open and flexible private cloud environment within 30 days. Consisting of hardware, software and services, HP …

Too many disclose sensitive information on social networks

Social networking users should be careful when accepting friend requests and to be conscious of the data they share. According to a new study by BitDefender, social network …

Week in review: New data breach legislation, cloud hacking and the return of the Alureon rootkit

Here’s an overview of some of last week’s most interesting news and articles: Trojan simulates MS Security Essentials Alert, peddles fake AV A Trojan imitating a …

First rootkit targeting 64-bit Windows spotted in the wild

Alureon rootkit is back, and has acquired the ability to hijack computers running 64-bit versions of Microsoft Windows, proclaimed Marco Giuliani, security researcher with …

Private cloud automation platform

Quest Software released Cloud Automation Platform 7.5, its enterprise-class cloud automation and management technology. New features include: Instant cloud insight with the …

Airport Internet terminals open to infection

Maybe you’re already aware of the dangers that public terminals can present to you or your computer. About two months ago, we had the instance of a photo kiosk that was …

25% of new worms are designed to spread through USB devices

In 2010, 25 percent of new worms have been specifically designed to spread through USB storage devices connected to computers, according to PandaLabs. These types of threats …

Major fake anti-virus attack spreading

Computer users should be cautious in the wake of a widespread spam campaign designed to infect users with fake anti-virus products. If recipients open HTML files attached to …

Infected flash drive blamed for US military breach

The most significant computer systems’ breach in U.S. military history dates back to 2008, when malicious code contained in a flash drive infected a laptop of a military …

Secure wireless access points from SonicWALL

SonicWALL released two new secure wireless access points – the SonicPoint-Ni and SonicPoint-Ne. Designed for enterprises, SMBs and distributed wireless networks, the new …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools