Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Malware in rich media and content

Cybercriminals most commonly used PDF and Shockwave Flash rich-media formats during the first half of 2009. In their State of the Internet 2009 report, CA discusses how …

Office 2003 bug blocks access to files

On Friday, a bug in the Office 2003 products (Word, Excel, Outlook and Powerpoint) caused users to be unable to open or save files that were protected by the Active Directory …

Facebook privacy and security guide

This is a video created by Tom Eston from SocialMediaSecurity walking you through the new Facebook privacy settings. It also covers notifications, Facebook Ads and hiding your …

A closer look at Trend Micro HouseCall 7.1

HouseCall is a on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plugins, and other malware. It is a stand-alone thin-client application …

Identify vulnerabilities with Microsoft’s CAT.NET tool

CAT.NET is a binary code analysis tool that helps identify common variants of certain prevailing vulnerabilities that can give rise to common attack vectors such as Cross-Site …

Attacks on strong authentication factors need new defenses

Fraudsters have started to raid user accounts by beating strong two-factor authentication methods. Gartner analysts said that Trojan-based, man-in-the-browser attacks are …

The 2010 threat landscape

The 2010 threat landscape In conjunction with their State of the Internet 2009 report, CA outlined their online security predictions for 2010. 1. Search engine optimization …

Serious SQL flaw could have compromised millions of Rockyou.com users

Imperva has issued a warning after finding a serious SQL injection flaw with Rockyou.com – a social networking application development web site. The SQL injection flaw …

World of Warcraft phishing scam

World of Warcraft (WoW) players should be on the lookout for phishing sites trying to get their user info. One still operating at time of writing is worldqfwarcraft.com. This …

Vendors deliver compromised products

Users should be aware of potential threats created by devices that are already compromised or tampered coming off the shelves. The Trend Micro 2010 Future Threat Report talks …

Week in review: Massive SQL injection attack, botnets, security trends and the Conficker worm

Here’s an overview of some of last week’s most interesting news, interviews and articles: Phishing campaign targets cPanel users Trusteer warned the customers of …

A closer look at ESET Online Scanner

ESET Online Scanner is a free online tool for detecting and removing malware from any PC by using only your web browser – there is no need to install anti-virus …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools