Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Police push for fast access to ISP data

According to the answers given by a 100 police investigators, they are not very satisfied with the speed with which they are able to access company documents during …

Hackers make millions through stolen carbon credits

Anything worth anything is worth something to somebody. And carbon credits are not just something small – these days, they’re worth millions. It is no wonder, …

Life of a Chinese hacker

Majia is in his early twenties, and is a college graduate with a degree in engineering. During the day, he works at a government agency. But at night, he is free to follow his …

Cracking encrypted iPhone backups

iTunes routinely makes backups of iPhones and iPods being synced to it. Such backups contain a plethora of information, essentially all user-generated data from the device in …

Keeping World of Warcraft accounts safe

Blizzard Entertainment is taking seriously the string of account hijacking that had as a target its World of Warcraft users in the last few years. It is only normal, since the …

Top 10 malware threats for January

Sunbelt Software announced the top 10 most prevalent malware threats of January 2010. The top seven detections were the same as December, but in a slightly different order. In …

Off-Twitter phishing attack explained

The mystery of the off-Twitter phishing attack, due to which some account passwords have been reset by the service, has been solved. Del Harvey, Director and leader of …

Entrust placed in leaders quadrant for Web fraud detection

Entrust has been positioned in the leaders quadrant of Gartner’s 2010 Magic Quadrant for Web Fraud Detection. Gartner’s Magic Quadrant for Web Fraud Detection …

1,400 personal records stolen from Columbia College

Three notebook computers were stolen two weeks ago from an office at the Columbia College, containing personal information, including social security numbers, of 1,400 of …

Black hat hackers on demand

Everybody knows that malicious hacking is illegal, but there are services out there that seem not very concerned with the fact. Some of them have been operating for 3 years …

The value of stolen credentials

The rapid evolution of Web 2.0 services and the parallel world of cybercrime is driving a revolution in the price that criminals charge each other for user credentials. The …

iPhone OS 3.1.3 patches security issues

iPhone OS 3.1.3 deals with several security issues outlined below. CoreAudio A buffer overflow exists in the handling of mp4 audio files. Playing a maliciously crafted mp4 …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools