Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Bug in iOS Mail app is a dream come true for phishers

A serious bug in the default Apple iOS Mail application can be easily exploited to show extremely realistic-looking pop-up prompts and trick users into sharing their Apple …

How to develop effective honeypots

Honeypots – decoy systems used for learning cyber attackers’ capabilities and potential objectives – can be very useful to organizations, businesses, and …

153 machines still infected with Stuxnet

“The threat that Stuxnet presents for nuclear power plants is far from over, as there are still 153 distinct machines infected with it around the world. The discovery …

Mozilla increases rewards given out to bug hunters

Once again the Mozilla Foundation has upped the bounties it offers to researchers who find and responsibly disclose vulnerabilities in Firefox.“Those of us on the Bug …

Hackers can tamper with medical drug pumps, leading to fatal outcomes

Researcher Billy Rios has discovered serious vulnerabilities in several types of drug infusion pumps manufactured by US-based company Hospira – vulnerabilities that can …

On Windows 10, apps can actively defend users from malware

“With Windows 10, Microsoft will be adding a new layer of protection against dynamic script-based malware and non-traditional avenues of cyberattack: the Antimalware …

Users care about their privacy, but feel powerless to protect it

Users are resigned to the loss of privacy, but not because they feel they are getting good value for their data, but because they believe marketers will eventually get it …

iOS 9 will use 6-digit passcodes for enhanced protection

Among the improvements that Apple announced for iOS 9 on Monday, there are some security enhancements as well.The most important one is the switch from 4-digit to 6-digit …

IoT is full of gaping security holes, says Shodan creator

John Matherly’s Shodan, a search engine that finds Internet-connected devices, can be used for many things: gauging the impact of policies and network security efforts …

Antiquated environment and bad security practices aided OPM hackers

By now, you’ve all heard about the massive breach at the US Office of Personnel Management’s (OPM), and that the attackers have accessed (and likely made off with) …

MalumPoS can be customized to target different systems

“A new Point-of-Sale RAM scraper is being offered for sale, and is currently designed to collect data from a very specific type of PoS systems: those running on Oracle …

Personal info of 4 million US government workers compromised in OPM breach

Approximately 4 million US federal employees, both current and former, will start receiving a breach notification alerting them that their personal information has potentially …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools