Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Online shopping safety: Consumers hold retailers responsible

Almost a quarter (24%) of UK adults believe retailers are primarily responsible for making online shopping safer, according to a survey of 1004 consumers by CyberSource. This …

Seagate ships the Savvio 10K.4 hard drive

Seagate today announced its Savvio 10K.4 hard disk drive, the world’s highest-capacity 2.5-inch enterprise-class drive. Built for the demands of enterprise servers and …

Political hacktivism and the exploitation of tragedies is on the rise

A new McAfee report highlights the rise of political hacktivism in countries like Poland, Latvia, Denmark and Switzerland as well as the most significant spam-generating …

Multiple vulnerabilities in popular Web servers

When a file is created on a Windows system, a DOS-compatible 8.3 short file name (hereafter referred to as ‘8.3 alias’) is generated for backwards compatibility …

Automated malware analysis platform

HBGary released Responder Professional 2.0, a Windows physical memory and automated malware analysis platform that analyzes all programs in memory including malware to obtain …

Beyond the cloud: Common Assurance Metric

The Common Assurance Metric (CAM) launched today is a global initiative that aims to produce objective quantifiable metrics, to assure Information Security maturity in cloud, …

Phishing site spoofing secure login page

A phishing site masquerading as the secure login page of CenturyLink, the fourth largest local exchange telephone carrier in the US in terms of access lines, has been …

Zero-day vulnerabilities on the market

Zero-day vulnerabilities have become prized possessions to attackers and defenders alike. As the recent China-Google attack demonstrated, they are the basis on which most of …

Rogue software details: AntiSpyware

AntiSpyware is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Sensitive information retrieved from P2P networks

Security researchers Larry Pesce and Mick Douglas demonstrated on Friday – at this year’s ShmooCon security conference in Washington, D.C – the amazing …

Biggest Chinese hacker training site taken down

Black Hawk Safety Net, the biggest Chinese hacker training site, has been shut down by the police. The tally is: three people arrested; nine Web servers, five computers and …

Safer surfing mobile social networks

ENISA (the European Network and Information Security Agency) today presents a new report on accessing social networks over mobile phones which points out the risks and threats …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools