Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Backdoor Trojan uses “magic code” to contact C&C server

Researchers from security firm Seculert have unearthed a curious piece of backdoor-opening malware. Once the malware gets installed on a computer and run, it first contacts …

Spamhaus-themed ransomware delivered through exploit kits

It seems that users are starting to recognize ransomware accompanied with fake notifications by copyright enforcement and law enforcement agencies for what it is, and cyber …

News of Boston Marathon bombings used to spread malware

As expected, the Boston Marathon bombings have become an effective lure in the hands of cyber scammers and malware peddlers. Kaspersky Lab researchers are warning about spam …

90% of game hacks and cracks contain malware

Computer and online gaming is big business for companies creating the games, but a considerable drain on the finances of gamers, so it should not come as a surprise that many …

First anti-malware product for UEFI

Kaspersky Lab released Kaspersky Anti-Virus for UEFI (KUEFI) – an anti-malware solution which can protect the user’s PC before the operating system even starts …

Mobile malware up 163%

Mobile malware threats increased 163% to more than 65,000 in 2012, according to NQ Mobile. The problem is becoming more complex as smarter mobile malware can better target …

Real-world test of 21 antivirus products

AV-Comparatives have released results of their latest Real-World Protection Test. These show that in a real-world digital environment with ever-increasing malicious programs, …

ZeroAccess Bitcoin botnet shows no signs of slowing

FortiGuard Labs observed that the Bitcoin mining botnet, ZeroAccess, was the number one threat last quarter. Their report also reveals new analysis of the South Korea …

Malicious HP scan notifications target employees

Users are once again being targeted with fake notifications about a scanned document, but instead of attaching a malicious file to the email, malware peddlers have opted for …

Malware analysis for Virtual Desktop Infrastructures

HBGary unveiled Active Defense 1.3 to provide live, runtime memory analysis of concurrent Guest OS sessions with minimal impact on the shared physical resources of the …

Cutwail botnet now spreads Android malware

Successful malware peddlers are always thinking up new ways of delivering malware to unsuspecting users. In the past Android malware was mostly served on third-party online …

“Your private naked photos online” emails lead to total computer compromise

Malware peddlers continue to use the old “your naked photos online” lure to trick users into following malicious links or downloading malicious attachments, warns …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools