Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Simulated cyber attack will test US Government response

An article in The Atlantic with the title “U.S. To Be Hit By Massive Cyber Attack On Feb. 16. Asterisk.” has set some readers to panic mode because they assumed it …

Critical infrastructure is a primary cybercriminal target

Critical infrastructure such as energy, pharmaceutical and government assets are more than twice as likely to be targeted by cybercriminals than other organizations, according …

Hacking games: Key to finding cybersecurity talent

To catch a thief, you must think like a thief – the best way to defend an asset is to get inside the head of the attacker and predict his actions. That’s the …

Security advice for Valentine’s Day

Malware that uses Valentine’s Day as a lure to trick users and infect computers is now a well-established feature of the IT security calendar. Once again, it will be no …

Rogue software details: Security Antivirus

Security Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

ZBOT/Zeus makers mock AV companies

The ZBOT/Zeus banking Trojan has been a well-known fixture of the threat landscape these last years, and can thank its developers for the constant changes that keep it from …

32% of computers with AV protection are infected

A SurfRight report shows statistics that give credibility to the lately popular opinion that one anti-virus solution is no longer enough to be sure your computer isn’t …

Botnet turf war on the horizon

It seems that one of the predictions for 2010 from Websense’s report is likely to come true: bots will be able to detect and actively uninstall competitor bots. SpyEye …

Operation Aurora malware investigated

Operation Aurora has become a name that is instantly recognized by everyone involved in cyber security. Speculation still abounds regarding the people and/or nation behind it, …

Rogue software details: Advanced Defender

Advanced Defender is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

VNC Viewer for iPhone and iPod touch

RealVNC has launched VNC Viewer, an iPhone and iPod touch application that allows you to connect to and take full control of a computer anywhere in the world. Available to …

Government sites crumple under Operation Titstorm’s DDoS attack

Following the announced Internet censorship plans of the Australian government, which will likely include Internet filtering and the banning of some forms of pornography, the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools