Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Rogue software details: SpyEraser

SpyEraser is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Privacy issues of data collecting

Will 2010 see the beginning of a change in regulations regarding net privacy? It’s hard to tell. The issue has been a matter for dispute for quite some time now, but …

Classification of weaknesses and attacks

The Web Application Security Consortium (WASC) released Threat Classification 2.0. The Threat Classification is an effort to classify the weaknesses, and attacks that can lead …

2010: A good year for fighting cybercrime?

McAfee Labs believes cybercriminals will target social networking sites and third-party applications, use more complex Trojans and botnets to build and execute attacks, and …

GSM encryption algorithm cracked

The A5/1 privacy algorithm – more commonly known as the GSM algorithm – has been cracked and published by Karsten Nohl, a German encryption expert. He says his …

Phishers prefer Paypal, Visa, eBay and Amex

Compared to the first half of 2009, the amount of phishing messages has remained relatively unchanged, although phishers have switched their focus to institutions that could …

E-threats shifting with current events

Malware writers have preserved their focus on web-based attacks while actively looking for new methods to disseminate their products. BitDefender released the results of its …

Twitter bans obvious passwords

An applause for Twitter which has recently made it so that when you sign up for an account you can’t use one of those very obvious passwords. Here is a list of these …

Rogue software details: KeepCop

KeepCop is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\ProgramFiles\KeepCop …

Greatest security threats to education

With education-related cyber-security threats expected to rise in 2010, WatchGuard is predicting the top threats facing schools, colleges and universities. Top threats …

A closer look at Trend Micro Internet Security 2010

Trend Micro Internet Security detects and removes viruses, spyware, and other threats from your computer, email, instant messages, and downloads, blocks untrustworthy links in …

Metasploit Framework 3.3.3 comes with exploit rankings

The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools