Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Modification risks from portable devices

Software crackers are likely to continue modifying relatively low-cost specific-application devices, such as e-readers, but that the potential security risks to companies are …

Splunk 4.0.8 released

Splunk released version 4.0.8 of the Splunk IT search and analysis engine. General issues When you save a top or rare search with the argument showperc, the showperc argument …

The Pentagon waiting for its computer networks defense command

The Pentagon had planned to launch a cyber command that would be responsible for defending its global network of computer systems on October 1, following it by the appointment …

Top 10 application security trends

The Denim Group has announced its guidance on the top application security trends for 2010. 1. Web mashup applications will result in new attack vectors Web applications …

Secure encrypted ruggedized mobile hard drive

Rocstore announced its new line of Rocsecure Commander 2 encrypted external hard drives. The first of its kind in ruggedized design, the Commander 2 series pocket drives are …

25 million new malware strains in one year

The outstanding trend of the last 12 months has been the prolific production of new malware: 25 million new strains were created in just one year, compared to a combined total …

Twitter and Google account vulnerabilities

Nir Goldshlager, a security researcher and penetration tester, discovered some XSS vulnerabilities in Twitter and Google Calendar that can be exploited by attackers to steal …

Criminal found through World of Warcraft

It seems that law enforcement agencies are getting more creative with ways of leveraging dug up information about wanted criminals. Using the knowledge of a previously …

iPhone network sniffer

Pirni is the worlds first native network sniffer for iPhone. The iPhone’s Wi-Fi has some major drawbacks in its hardware design, thus we can not properly set the device …

F-Secure protects smartphone data

F-Secure released its new standalone smartphone solution, Anti-Theft for Mobile which provides three useful security features to protect your phone: remote lock, remote wipe …

Automatic analysis of malware behavior

Malheur is a tool for automatic analysis of program behavior recorded from malware. It has been designed to support the regular analysis of malicious software and the …

File-scanning services for malware writers

A lot of people are aware of and are using online file-scanning services when they want to check if a suspicious file they got as an attachment or have found on their computer …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools