Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Critical vulnerability in Adobe Download Manager patched

A critical vulnerability has been identified in the Adobe Download Manager. This vulnerability (CVE-2010-0189) could potentially allow an attacker to download and install …

Secretary of Homeland Security Janet Napolitano to keynote RSA Conference 2010

RSA Conference 2010 announced that Janet Napolitano, U.S. Secretary of Homeland Security, is scheduled to deliver a keynote on Wednesday, March 3, 2010 at 3:10 PM. Secretary …

IT firm falls victim to online bank fraud, loses $100,000

The latest company to fall victim to a plundering of their account by the hands of cyber criminals is Cynxsure, an IT consultancy firm based in New Hampshire. The criminals …

Windows Live ID phishing spam

Joe Wilcox warns of what seems to be an attempt to phish his Windows Live ID and password. Here is the contents of the email purporting to come from the “Windows Live …

The need for global cooperation on cyber security

When the Internet was in its teens, it was hard to imagine it evolving as far as it has. Yesterday I was chuckling over an article from 1995 in which the author adamantly …

First certified cloud-based solution for FDCC compliance

Qualys announced its new QualysGuard FDCC module – the first certified cloud-based computing solution for FDCC compliance. The module, validated by the National …

Rapid7 NeXpose now includes Exploit Exposure

Rapid7 announced Exploit Exposure, a new technology in its vulnerability management product, Rapid7 NeXpose. Exploit Exposure provides users with deeper insight into the …

What’s a rogue and why do you need to know?

You may not be familiar with the term rogue software but there’s a very good chance that you or someone you know either has experienced it, or will in the near future. …

Phishers target Blogger users

Users of Google’s Blogger, a free blog publishing tool, are the targets of the latest phishing email campaign: The text of the message couldn’t be simpler, and the …

Widespread data breaches uncovered by FTC probe

The Federal Trade Commission has notified almost 100 organizations that personal information, including sensitive data about customers and/or employees, has been shared from …

Excalibur Conference 2010 call for papers

In autumn 2010, the Excalibur Conference in China, will feature talks but world-renowned security professionals that will address new areas of research. The event will cover …

Warrantless cell phone tracking on the horizon?

There is no doubt about the fact that real time or historical tracking of criminals’ movement via their cell phones can come really handy to law enforcement officers. It …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools