Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Adobe patches Flash Media Server

Critical vulnerabilities have been identified in Adobe Flash Media Server (FMS) 3.5.2 and earlier versions. The vulnerabilities could allow an attacker, who successfully …

Intel patches flaws in its Trusted Execution Technology

Invisible Things Lab – who specialize in system-level security – issued yesterday the results of their research in which they describe how flaws in Intel’s …

Tripwire’s top 5 IT security predictions for 2010

With increasingly stringent compliance mandates, the explosion in virtualization interest and adoption, demands for audit reporting, and a spike in security breaches, 2009 has …

7 smartphone security tips

Lookout, a mobile security startup, suggests seven tips to staying safe on your smartphone. Whether you use your smartphone for business or pleasure, securing the computer in …

A closer look at Kaspersky Anti-Virus for Mac 8.0.1.358

Kaspersky, the renowned software security company, has recently released an anti-virus solution for the Mac OS. It contains the company’s signature-based protection from …

Brittany Murphy’s death used for peddling rogue security software

It didn’t take long before cybercriminals seized the opportunity to use the death of actress Brittany Murphy to peddle malware. The most obvious choice was search engine …

Microsoft Security Update Guide

The Microsoft Security Update Guide was designed to help IT professionals better understand and use Microsoft security release information, processes, communications, and …

Looking back at malware in 2009

2009 was the year in which nobody that uses the Internet could afford not to educate him/herself about the dangers that lurk in the inbox, in Google’s search results, on …

Rogue software details: TheDefend

TheDefend is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

2010 cyberthreat forecast: Attack vectors

2009 was dominated by sophisticated malicious programs with rootkit functionality, Conficker, web attacks and botnets, SMS fraud and attacks on social networks. With the start …

New books: Windows 7, Programming #F

With Windows 7: The Definitive Guide you will learn how to squeeze every bit of power out of Windows 7 to take full advantage of its features and programs. You will learn how …

Week in review: Migrating to Windows 7, VoIP vulnerability trends and online safety guide

Here’s an overview of some of last week’s most interesting news, interviews and articles: Serious SQL flaw could have compromised millions of Rockyou.com users The …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools