Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Microsoft’s study into unsecure supply chains leads to botnet disruption

Microsoft’s Digital Crimes Unit has disrupted the functioning of yet another botnet by effecting a takedown of a domain which was also hosting over 500 different strains …

Botnet operators hide C&Cs in the Tor network

Over the years, botnet owners have tried out different tactics for keeping their C&C servers online, in contact with the zombie computers, and hidden from researchers and …

Every third computer in North America attacked while online

An in-depth analysis of the nature of cybercrime in North America and Western Europe in the first six months of 2012 by Kaspersky Lab found that the computers of 33.4% of …

Who is the most dangerous cyber celebrity?

Emma Watson has replaced Heidi Klum as McAfee’s 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular …

Mobile malware has become a profitable industry

Lookout released its State of Mobile Security Report 2012 which explains the issues that individuals faced on mobile devices this year and explores the prominent trends in …

Shamoon attacks persist

While it still unknown whether the recent attacks against Saudi Aramco and RasGas were part of the so-called Shamoon attacks, the latter are continuing unabated, says …

Fake Amazon emails open the way for malware

The CVE-2012-4681 Java zero-day vulnerability might have been patched, but because it was added to the popular Blackhole exploit kit and because most users regularly forego …

Fake AmEx “Security Verification” phishing emails doing rounds

Malicious spam emails impersonating American Express have been hitting inboxes in the last few days, trying to make recipients open the file in the attachment. The email …

“Win 8 Security System” rogue AV spotted

Windows 8 has not yet been released and cyber crooks are already taking advantage of its name. McAfee researchers have recently spotted a new rogue AV solution dubbed …

Spoofed Microsoft notification leads to Zeus

Microsoft has updated its Services Agreement last week, and has begun notifying its users about the change via email. Eager to take advantage of any kind of legitimate opening …

AV-killing worm spreads via Facebook chat and IM clients

A rather industrious piece of malware that – among other things – paves the way for other malware by disabling AV solutions and software update modules has been …

Java 0-day exploit served from over 100 sites

The problem of the two unpatched Java zero-day vulnerabilities that are actively exploited in the wild by attackers looking to gain access to their targets’ computers is …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools