Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Security incidents at an all-time high

The Computer Security Institute (CSI) pre-released selected findings from its 2009 Computer Crime and Security Survey. The survey, now in its 14th year, found that average …

Wall Street Journal website vulnerable to SQL injection

A Romanian security researcher that goes by the handle “Unu” has made public his latest conquest. He managed to gain access to databases of the The Wall Street …

Facebook privacy changes

Facebook CEO Mark Zuckerberg addressed Facebook users via an open letter today, and announced a few changes aimed at improving the privacy settings and allow users more …

Security concerns hinder cloud computing adoption

Concerns about the security of cloud computing environments top the list of reasons for firms not being interested in the pay-per-use hosting model of virtual servers, …

Internet worms record rapid global growth

Major security developments in 2009 included Conficker, the most damaging networking worm for years. Conficker spread fast in computers using the Windows XP operating system …

Most dangerous web domains

Africa’s Cameroon (.cm) has overthrown Hong Kong (.hk) as the Web’s riskiest domain, according to McAfee’s third annual Mapping the Mal Web report, released …

Spam ring leader fined $16 million

Lance Atkinson, the Australia-based New Zealander that has been found guilty of organizing a spam ring along with American accomplice Jody Smith, has been fined with more that …

Freeware version of GFI EndPointSecurity

Endpoint security threats are constantly evolving and critical data is lost due to non-existent or ineffective security practices. The proliferation of high capacity thumb …

Break Microsoft BitLocker encryption

Passware created the first commercially available software to break Microsoft BitLocker hard drive encryption. BitLocker is an advanced, full-disk protection feature available …

FreeBSD bug grants root access to unprivileged users

A FreeBSD exploit that grants OS root access to unprivileged users was published yesterday on the Full Disclosure mailing list by Nikolaos Rangos, a German researcher that has …

Scam victim psychology: What makes you vulnerable?

“Understanding scam victims: seven principles for systems security” is a paper by Frank Stajano, an associate professor with the Computer Laboratory of the …

DNS rebinding exploit how to

The DNS rebinding exploit has caused much confusion. In this video, Robert “RSnake” Hansen explains how hackers can take advantage of this attack and why the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools