Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Counterfeit consumer electronics

Most people believe that if you want to be sure that you got an original product, you must buy it from a reputable retailer – especially if that product is an electronic …

Laptop theft exposes data on 207,000 army reservists

Personal data on 207,000 U.S. army reservists has recently been stolen along with three laptops from the offices of a government contractor (Serco Inc.). The U.S. Army Reserve …

Facebook’s changes clash with Europeans’ expectations of privacy

Europeans are well-known for their high privacy expectations and demands. Another proof of that is a letter that the Article 29 Working Party (an independent European …

Unsolicited fake CVs distributing malware

The global recession has brought a shortage of jobs, but job seekers are not the only ones who are targeted by malicious emails and scams. TrendLabs has recently spotted an …

Real-world data on software security initiatives

Cigital announced an updated release of the “Building Security In Maturity Model” (BSIMM) study, which significantly expands the data defining benchmarks for …

OneWay: Fast FTP, SFTP uploader for Mac OS X

OneWay is a contextual FTP, SFTP uploader for Mac OS X. You can upload files directly from the Finder. Save frequently used locations in your context menu for quick access. …

Rogue software details: Live PC Care

Live PC Care is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\live pc …

FacebookDigits phishing scam

Facebook users have lately been targeted lately by a clever phishing scam. The phishing website, whose looks evoke those of the social network, is trying to convince potential …

WordPress users under attack

WordPress-based websites have once again become the target of attacks. This time around, the hacked websites are hosted by various ISPs: DreamHost, GoDaddy, Media Temple and …

One crime syndicate responsible for most phishing attacks

A single electronic crime syndicate employing advanced malware was responsible for two-thirds of all the phishing attacks detected in the second half of 2009 — and was …

Less than half of cloud services are vetted for security

More than half of U.S. organizations are adopting cloud services, but only 47 percent of respondents believe that cloud services are evaluated for security prior to …

Stealth HD Series: USB portable security devices

MXI Security introduced the new Stealth HD Series of encrypted USB hard drives. Replacing the well-known Outbacker MXP Series, the Stealth HD Series is powered by MXI …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools