Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
GTA 5 cracked PC game scams users

Thousands of impatient gamers have been duped into downloading and running a bogus Grand Theft Auto V version for PCs that made them complete a number of surveys and …

A new classification for potentially unwanted mobile apps

What are PUAs (Potentially Unwanted Applications), and how should they be classified in the mobile (specifically Android) environment? PUAs are not technically malware, and …

Can you trust the apps you use?

With the advent of smartphones, the word “app” has almost become a synonym for pleasure. Whatever you need, whatever you want is right there at your fingertips, …

How meaningful are AV tests?

Anti-malware software from vendors big and small is regularly tested by several antivirus test labs, which may result in awards and certification, but also in disappointment. …

Apple’s iCloud protocols cracked and analyzed

Smartphones carry a lot of sensitive data that in theory should be accessible only to their owners. In practice, a lot of it can be exfiltrated from the devices and from the …

Customizing defense models to reduce the window of exposure

Most organizations already have a defense model in place that is meant to protect them from attacks, but the problem is that many use an outdated one. But the threat landscape …

Lessons learned from sinkholing the ZeroAccess botnet

ZeroAccess (or Sirefef) is a piece of malware that is very adept at hiding its existence from users, and brings in huge sums of money to its masters by performing click-fraud …

Convincing “Urgent Windows Error Fix” phishing email doing rounds

A pretty convincing email phishing campaign is targeting one of the largest user bases out there – those who use Microsoft’s Windows OS – by taking advantage …

Lavabit users allowed to access accounts and retrieve data

Lavabit’s Ladar Levison has announced that the users of his recently closed down email service will be able to briefly access their accounts so that they can retrieve …

Solving the dilemma of vulnerability exploitation disclosure

The subject of software and hardware vulnerability disclosure has been debate time and time again, and most agree that, if possible, vulnerabilities should first be disclosed …

Strengths and weaknesses of MS SmartScreen filter

Microsoft’s SmartScreen application control feature, introduced with Internet Explorer 8 and lately ported to Windows 8 is a good addition to the new OS. It might …

The many security problems of ATMs

As much as they are useful, ATMs are also very vulnerable to tampering and attacks from individuals looking for money. eWeek reports that at the SecTor security conference …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools