Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Bitcoin mining botnet also used for DDoS attacks

A recently discovered P2P Bitcoin mining botnet has acquired DDoS capabilities, warns Kaspersky Lab expert Tillmann Werner. It’s main reason of existence has so far been …

Anonymous member charged with computer offences

Peter David Gibson, 22, has been charged with conspiracy to do an unauthorized act in relation to a computer, with intent to impair the operation of any computer or prevent or …

Zeus rival boasts of eluding tracker services, fails

Kaspersky Lab expert Jorge Mieres wrote yesterday about Ice IX – the first crimeware based on the leaked Zeus source code. “Ice IX Botnet is the first new …

Install one Trojan, get three more

Downloader Trojans are often used by cyber crooks to thoroughly infect systems in order to extract anything that might be of value to them. Trojan.Badlib is a particularly …

Have you been hacked this month?

I’m assuming the majority of people are sitting smugly reading this thinking “of course I haven’t!’ You do everything you’re supposed to do, …

One click away from digital disaster

61 percent of consumers click on links while online that take them to unexpected places, making them vulnerable to cyberattacks that can lead to identity theft, according to …

Ramnit worm uses Zeus Trojan tactics for banking fraud

Trusteer discovered the 18 month old file infecting worm Win32.Ramnit has morphed into financial malware and is actively attacking banks to commit online fraud. Ramnit …

Nokia Developer forum hacked

The Nokia Developer forum has been hacked and its main page modified to redirect to another page where the individual behind the hack left his mark: The forum is now back in …

Chinese mobile phone monitoring service found

What do you think cyber crooks do with the information collected from mobile phones by malware? Trend Micro has one of the answers to that question. Its researchers have …

Keeping abreast of Web malware delivery techniques

One of the crucial things that Google must do to keep making Internet users use its search engine is to keep an eye on the many ways that cyber criminals employ to spread …

Craigslist phishers warn about phishing

Scammers are targeting Craigslist users again – this time with a phishing page that tries to trick users into believing it’s legitimate by containing a warning …

Fraudster broke into bank accounts by using Facebook info

An English man has been been found guilty of siphoning money out of bank accounts after using social networks to guess the security questions for the account owners’ …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools