Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Malware controls 620,000 phones, sends costly messages

A new discovered malware is potentially one of the most costly viruses yet discovered. Uncovered by NQ Mobile, the “Bill Shocker” (a.expense.Extension.a) virus has …

FedEx-themed malicious emails bombarding inboxes

FedEx customers are constantly targeted with malicious emails supposedly coming from the global courier delivery service, but since the start of the year, FedEx-themed spam …

Bogus Windows 8 activators collect users’ private info

Despite Windows 8 sales being not as good as Microsoft hoped, there is considerable interest in the new OS version. Still, not everybody wants to pay to try it out, and …

Trojan stole over 16,000 Facebook credentials

ESET discovered a social engineering Trojan horse that managed to steal the login credentials of more than 16,000 Facebook users. The ‘PokerAgent’ Trojan targeted …

Trojan uses anti-spam system to keep in touch with C&C servers

Most malware is severely crippled if it can’t contact the C&C servers from which it receives its instructions and updates, so malware authors are constantly coming …

Cutwail botnet on spam rampage, delivers Cridex worm

Since its inception some six years ago, the Cutwail / Pandex botnet experienced its fair share of setbacks, but it’s still going strong. The main reason for its …

The arrival of the post-PC threat era

With the release of its 2012 Annual Roundup and Mobile Security reports, Trend Micro documents how cybercriminals have moved beyond the PC, targeting Android, social media and …

Employees targeted with fake DocuSign “confidential message”

An email purportedly sent by the DocuSign Electronic Signature Service on behalf of the administrative departments of a wide variety of organizations and businesses is hitting …

Skype becomes a malware minefield

Skype users should be careful when using the service these days. First CSIS researchers unearthed a campaign misusing Skype to replicate and spread the Shylock banking Trojan …

New RAT family makes its traffic look legitimate

RATs – Remote Access Trojans – are often used by cyber attackers to maintain a foothold in the infected computers and make them do things unbeknownst to their …

Cybercriminals exploit Java 0-day fears to serve malware

With all the recent Java zero-day vulnerabilities being exploited in the wild and Internet news outlets heavily covering the development of the situation, many users will look …

Microsoft AVs not good enough, says AV-Test

AV-Test, the well-known independent organization that tests security software for home and corporate users, has released the results of the latest testing – and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools