Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Popular Android games unmasked as phishing tools

“ESET researchers have discovered a new, ingenious, yet very simple Facebook phishing scheme: playable Android games that, before they are started, ask users to enter …

Fake Android battery monitor app thoroughly compromises users’ devices

“Downloading apps from Google Play is a safer proposition than doing it from third party markets, but despite Google using an automated app scanning service …

Hackers targeting users of Barclays, Royal Bank of Scotland, HSBC, Lloyds Bank and Santander

19,000 malicious emails have been sent in three days from spam servers worldwide, inviting users to download an archive containing a malicious .exe file. Bitdefender warns …

Another malware building toolkit leaked, botnets already popping up

“Another malware building toolkit has been leaked, allowing less tech-savvy crooks to generate a fully functional variant of the KINS banking Trojan and to inject its …

Old MS Office feature can be exploited to deliver, execute malware

A Microsoft Office functionality that has been in use since the early 1990s can be exploited to deliver malicious, executable files to users without triggering widely used …

The top three banking malware families

“The primary motivator behind banking malware attacks is to capture credentials, financial data, and personal information from employees, and partner company employees, …

4,900 new Android malware strains discovered every day

“G DATA security experts discovered 440,267 new Android malware strains in the first quarter of 2015, which means that a new mobile malware strain for Android was …

Why a low-level threat can open the door for serious infections

“A device hi-jacked for the purpose of conducting click-fraud can become a conduit for more serious malware such as ransomware. A Damballa study cited an example of how …

Update your Flash Player if you don’t want ransomware

“It didn’t take long for exploit kit authors to incorporate an exploit for the recently discovered zero-day Adobe Flash vulnerability (CVE-2015-3113) into their …

Nigerian scammers are stealing millions from businesses

When someone mentions advanced fee or romance scams most people immediately associate them with Nigerian scammers. But there is another type of scam that these fraudsters …

Why a Dyre infection leads to more than just stolen banking credentials

“The Dyre/Dyreza information-stealer has without a doubt filled the vacuum generated by the 2014 and 2015 law enforcement takedowns of botnet infrastructure of several …

The downfall of a major cybercrime ring exploiting banking Trojans

“A joint investigation team (JIT) consisting of investigators and judicial authorities from six different European countries, supported by Europol and Eurojust, has …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools