Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Cyber crooks misuse Google service to control Android Trojans

Cybercriminals have been spotted using a novel method of controlling Android mobile malware: a legitimate service called Google Cloud Messaging. GCM has been created to allow …

Free Android anti-virus for mobile devices

Avira Free Android Security reached 2.0 and offers antivirus scanning and removal, as well as retaining the remote lock, wipe and “scream’ features available in …

Malicious ads lead to outdated adware-laden Firefox “update”

A series of Internet campaigns pushing bogus Firefox updates onto unwary users have been spotted by researchers, and among them is one that lures them in through “Green …

Protect against threats targeting Android

Palo Alto Networks’ WildFire malware analysis sandbox now is capable of analyzing Android applications in the APK file format to identify advanced threats in Android …

More apps exploiting Android “Master Key” bug found

Patches for the two recently discovered Android “Master Key” bugs are still to be pushed out by many mobile carriers and device manufacturers. In the meantime, …

Reveton changes tack, relies on fake AV

When it comes to the infamous Reveton ransomware, cyber crooks are forever coming up with additional ways to bilk money from users: pairing it up with banking Trojans, playing …

Linux banking Trojan offered for sale

Windows users are by far the most targeted ones by malware-wielding criminals, but that doesn’t mean that OS X and Linux users should feel impervious. In fact, RSA …

Expect more Android security issues in 2013

Android vulnerabilities, increased online banking threats and availability of sophisticated, inexpensive malware toolkits are among the growing concerns cited in Trend …

Attackers are taking advantage of old vulnerabilities

FortiGuard Labs observed a 30 percent increase in mobile malware in the labs over the last six months. The team is now seeing more than 1,300 new samples per day, is currently …

Enterprises in denial regarding network security

Many enterprises possess an unrealistic confidence surrounding the security of their networks. According to a Lancope survey, more than 65 percent of IT/security professionals …

Cross-platform backdoor created with RAT available online

For malware authors and attackers, the ideal malware is that which works on as many platforms as possible. As Java is used in a wide variety of computing platforms, it stands …

Tor users targeted with spyware following anonymous Web-host shutdown

The news that the alleged owner of Freedom Hosting, the internet host for a great number of Tor hidden services, has been arrested and is accused of distributing and promoting …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools