Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Scareware trends and expected developments

While malware such as viruses, worms and Trojans strives to remain hidden from view for as long as possible, scareware (rogueware and ransomware) aims to be as noticeable and …

China-based hackers infiltrated New York Times’ network

The New York Times’ computer systems and network has been breached and its journalists’ private computers and email correspondence spied on for a period of four …

Firefox will block by default nearly all plugins

Following the recent debacle of the critical Java 0-day that was being actively exploited in the wild, in an attempt to minimize its users’ attack surface Mozilla has …

FedEx-themed malicious emails bombarding inboxes

FedEx customers are constantly targeted with malicious emails supposedly coming from the global courier delivery service, but since the start of the year, FedEx-themed spam …

Bogus Windows 8 activators collect users’ private info

Despite Windows 8 sales being not as good as Microsoft hoped, there is considerable interest in the new OS version. Still, not everybody wants to pay to try it out, and …

Internet-facing printers remain a huge risk

Despite repeated warnings about office and home devices being accessible from the Internet when there is no good reason for them to be, every now and then someone gets the …

Google offers over $3M for breaking Chrome OS

With $3.14159 prize pool and a completely new target, Google’s Pwnium contest has become an even greater challenge for security researchers out to make a buck from their …

U.S. DoD’s cybersecurity force to increase fivefold

The Pentagon is poised to start searching for more than 4,000 new employees for the Defense Department’s Cyber Command, in a bid to boost its cyber defensive and …

Facebook’s CPO tackles privacy policy questions

When late last year Facebook changed its Statement of Rights and Responsibilities and Data Use Policy, the social network’s users lost their right to vote on future …

Trojan uses anti-spam system to keep in touch with C&C servers

Most malware is severely crippled if it can’t contact the C&C servers from which it receives its instructions and updates, so malware authors are constantly coming …

AV developer Avast starts bug bounty program

Avast, the Prague-based maker of the popular eponymous AV software, has announced the introduction of a bug bounty program. Rewards are offered only for security-related bugs …

GitHub’s new search reveals passwords and private keys

GitHub, the popular online source code repository, has unveiled on Wednesday a new search infrastructure that should help coders find specific code within the millions of the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools