Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Russians responsible for 30% of mobile malware

Lookout investigated 10 Russian-based organizations, uncovering that the mobile malware industry in Russia has become organized and profitable. These malware businesses …

FBI uses malware to spy on suspects via their phones

The FBI has been known to use malware to spy on suspects via their computers but mobile phones make even better sources of information. Just think about it: the great majority …

ZeroAcces rootkit dominates, adds new persistence techniques

According to a recent report by Alcatel-Lucent subsidiary Kindsight, as much as 10 percent of home networks and over 0.5 percent of mobile devices are infected with malware, …

Techniques malware authors use to evade detection

FireEye released a new report that reveals several techniques used by advanced malware to sidestep signature-based defenses during attacks. Today’s sophisticated, …

Cybergangs alter infrastructure abuse techniques

Phishing attack frequency declined 20 percent from Q4 2012 to Q1 2013, due to a precipitous drop in virtual server phishing attacks. APWG statistics indicate that phishing …

Panda Security updates Cloud Office Protection

Panda Security released Panda Cloud Office Protection (PCOP) 6.7, which will enable users to roll-out Panda Cloud Systems Management (PCSM) automatically on their network. …

Free first aid kit for computer viruses

Avira launched the Avira Rescue System, a software first aid kit for scanning and repairing PC computers that are already infected with malware. It can be downloaded for free …

Malware attacks via malicious iPhone chargers

Do you ever think twice about using someone else’s charger for recharging your iPhone? Well, you will now, as three Georgia Tech researchers have managed to install a …

NSS Labs unveils Threat Modeling and Threat Forecasting

NSS Labs announced availability of two new advisory services – Threat Modeling and Threat Forecasting – helping clients to better understand their risk and distill …

Automated remediation for APTs and 0-days

ThreatTrack Security unveiled The Spyder Initiative, a development strategy for solving the challenges cyber security professionals face, including the creation of custom, …

Chrome, Firefox users targeted with account-hijacking plugins

Hijacked social networking accounts can be monetized in a number of ways, so cyber crooks are always thinking up new ways of doing so, preferably without the user noticing. …

Norman Shark updates Malware Analyzer G2

Norman Shark announced Malware Analyzer G2 (MAG2) 4.0, which provides hybrid analysis, and Network Threat Discovery (NTD) 5.1, a cyberattack discovery system that …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools