Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Off-Twitter phishing attack explained

The mystery of the off-Twitter phishing attack, due to which some account passwords have been reset by the service, has been solved. Del Harvey, Director and leader of …

Entrust placed in leaders quadrant for Web fraud detection

Entrust has been positioned in the leaders quadrant of Gartner’s 2010 Magic Quadrant for Web Fraud Detection. Gartner’s Magic Quadrant for Web Fraud Detection …

1,400 personal records stolen from Columbia College

Three notebook computers were stolen two weeks ago from an office at the Columbia College, containing personal information, including social security numbers, of 1,400 of …

Black hat hackers on demand

Everybody knows that malicious hacking is illegal, but there are services out there that seem not very concerned with the fact. Some of them have been operating for 3 years …

The value of stolen credentials

The rapid evolution of Web 2.0 services and the parallel world of cybercrime is driving a revolution in the price that criminals charge each other for user credentials. The …

iPhone OS 3.1.3 patches security issues

iPhone OS 3.1.3 deals with several security issues outlined below. CoreAudio A buffer overflow exists in the handling of mp4 audio files. Playing a maliciously crafted mp4 …

Five months to detect a breach

When it comes to cyber attacks and breaches, the hospitality industry has been the most heavily targeted industry in 2009. This surprising information is among the findings …

(IN)SECURE Magazine issue 24 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 24 has been released today. Table of contents …

The truth about identity theft

Over the past five years, identity theft has become a growing, nationwide concern annually affecting approximately 10 million Americans. It’s an issue that is difficult …

Using social networks inadvisable without proper protection

While the advantages of social networks are obvious after a short period of use, the risks resulting from them are generally disregarded by their users, according to …

Google applicants targeted by phony job application response

People who have applied for a position at Google are in danger of being duped by a malicious email purporting to come from Google, thanking the recipients for sending in their …

Twitter users asked to reset their passwords after phishing attack

Many Twitter users have been locked out of their accounts today, following a suspected phishing attack. They received a message stating: “Due to concern that your …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools