Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
World target
Vulnerable Apache Solr, Redis, Windows servers hit with cryptominers

Vulnerable servers of all kinds are being targeted, compromised and made to mine cryptocurrencies for the attackers. Apache Solr servers under attack SANS ISC handler Renato …

Cisco
Cisco fixes critical flaw in its Secure Access Control System

Cisco has pushed out fixes for security vulnerabilities in a wide variety of its products, including two critical flaws in its Secure Access Control System (ACS) and its Prime …

Android P
Android P: Expected security and privacy improvements

Google has released a developer preview of the next version of Android, currently called “Android P.” Functional changes are many, but here’s an overview of …

UK
UK govt wants IoT manufacturers to take responsability for security

The UK government aims to shift the burden of securing IoT devices away from consumers and put the onus of securing them squarely on the manufacturers. “Poorly secured …

PC
Locked Windows machines can be compromised through Cortana

Compromising locked Windows computers that have the Cortana voice-activated virtual assistant enabled is relatively easy – or it was until Microsoft made a simple tweak. …

email
Exim vulnerability opens 400,000 servers to remote code execution

If you’re using the Exim mail transfer agent on your Internet-connected Unix-like systems and you haven’t yet upgraded to version 4.90.1, now is the time to do it …

Wire
Wire shares results of independent security audit of its secure messaging apps

When I last spoke to Alan Duric, co-founder and (at the time) CEO of the company developing secure messaging application Wire, he stressed the importance of independent and …

vulnerability
Criminals can build Web dossiers with data collected by browsers

Everybody knows by now that websites collect information about users’ location, visited pages, and other data that can help them improve or monetize the experience. But …

wallet
Cryptocurrency-stealing malware relies on victims copy-pasting wallet info

An unconventional email spam campaign has been delivering unusual cryptocurrency-stealing malware to American and Japanese users. The emails are sporting “Re: …

connected car
Backdooring connected cars for covert remote control

We’ve all known for a while now that the security of connected cars leaves a lot to be desired. The latest proof of that sad state of affairs comes from Argentinian …

mobile device
New LTE attacks open users to eavesdropping, fake messages, location spoofing

A group of researchers has uncovered ten new attacks against the 4G LTE wireless data communications technology for mobile devices and data terminals. The attacks exploit …

critical infrastructure
Keeping on top of ICS-focused hacking groups, defenses

How many hacking groups are focusing on ICS systems? Dragos security researchers say at least five were active in 2017. “While only one has demonstrated an apparent …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools