Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Inside a banking Trojan drop-zone

There can be no doubt that cybercrime is on the rise. Compared to real-world crime, it is easier, often more profitable, and carries definitely less risk to the perpetrator. …

Facebook apps now allowed to harvest users’ address and mobile phone number

The latest step that Facebook took in the long process of eroding our privacy expectations happened on Friday. The social network announced on their Developer Blog that from …

Ransomware continues to pose a threat

The great majority of cybercriminals is in it for the money. Some choose to steal it indirectly by using information-stealing malware to gain access to users’ online …

Former TSA employee sentenced for hacking agency’s databases

A former TSA worker has been found guilty and has been sentenced to two years in prison and a $60,587.07 fine to be payed to the TSA. He was accused of tampering with the …

Gamers breached medical server to play Call of Duty

An office server on which the New Hampshire Seacoast Radiology had stored sensitive personal and medical information of more than 230,000 patients has been breached in …

Bogus airline charge leads to Zeus Trojan

A recent spam campaign is targeting frequent users of a popular German airline carrier, baiting them with a exorbitant bogus fee that has apparently been charged to their …

Adobe changes Flash Player feature to prevent user tracking

In the last few years, Adobe has realized that their products will have no future if they don’t step up the security aspect, and so they started doing things like …

Raising the security bar: Know and fine-tune your IPS

A long time ago, people thought that having a firewall in place would protect their systems and networks from any and every outside attack. And for a very short while, they …

Third-party software responsible for most vulnerabilities

Most people owning a PC are familiar with Microsoft’s patching process – it’s easy and it’s there. For a lot of them, it also gives the impression that …

Who profits on vulnerabilities for sale?

The number of software vulnerabilities discovered during 2010 may be smaller than that of those discovered the previous year, but they still bring money to its discoverers. …

50,000 stolen iTunes accounts for sale in China

Some 50,000 iTunes accounts – each associated with an active credit card and some guaranteed to work for at least 12 hours before getting deactivated – are …

Mac App Store already cracked

The Mac App Store debuted yesterday, and it seems that a flaw has been found that allows you to get paid applications for free. Logan of AppInstect published a tutorial on how …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools