Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Can you trust Chinese computer equipment?

Steven J. Vaughan-Nichols, a blogger for IT World, raised the question, but before answering it, let’s take a look at the current backdrop that should affect the …

Infected Firefox add-ons pulled off official site

Two infected Firefox add-ons managed to avoid detection and were put online, available to download, on Firefox’s official add-on download site. The one thing that …

Social networks are a danger zone

It seems that everybody is on some kind of social network these days. Checking out what our friends are doing has become part of daily routine. In today’s world, they …

First man ever charged with hacking VoIP providers

The first individual ever charged with hacking into the networks of Voice Over Internet Protocol (VoIP) providers and reselling hacked VoIP services for a profit pleaded …

Rogue software details: GuardWWW

GuardWWW is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Cybercriminals focus on targeted attacks

When it comes to computer security, bad news usually follows even the rare positive statistic. In their latest report, Websense note that they’ve seen the number of …

Microsoft plans massive Windows patch next week

Microsoft announced it will deliver 13 bulletins Tuesday, February 9, 2010. They will address 26 vulnerabilities in Windows and Office, five of which are rated critical. The …

Google and NSA team up to fend off future attacks

Google and the NSA reached an agreement that will see the security agency helping with the investigation of the latest attack of the Internet giant that supposedly carried out …

NIST draft of smart grid cyber security strategy

The Commerce Department’s National Institute of Standards and Technology (NIST) issued the second draft of its Smart Grid Cyber Security Strategy and Requirements, which …

Windows file system exploitation at ShmooCon

At ShmooCon 2010 tomorrow, Core Security researcher Dan Crowley will demonstrate how features not widely known in Windows path and filename normalization routines cause …

Police push for fast access to ISP data

According to the answers given by a 100 police investigators, they are not very satisfied with the speed with which they are able to access company documents during …

Hackers make millions through stolen carbon credits

Anything worth anything is worth something to somebody. And carbon credits are not just something small – these days, they’re worth millions. It is no wonder, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools