Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Pokemon Go
Playing Pokémon GO can lead to unexpected dangers

Interest in Pokémon GO, the mobile augmented reality game that has users going places in the real world to capture, train, and battle with virtual Pokemon, has exploded the …

London
UK: Cybercrime now bigger threat than traditional crime

The accelerating pace of technology and criminal cyber capability currently outpaces the UK’s collective response to cybercrime, calling for stronger collaborative working …

Firefox
Kovter malware masquerades as Firefox update

Click-ad-fraud Kovter malware, packaged as a legitimate Firefox browser update, is being delivered to unsuspecting victims via drive-by-download attacks. Kovter, which also …

Biohazard
Ransomware: Can we finally start learning from past mistakes?

There is a phrase I am finding quite relevant lately. It is attributed to the philosopher George Santayana and it goes like this: “Those who cannot remember the past are …

Apple
Keydnap malware opens backdoor, goes after passwords in OS X keychain

ESET researchers have revealed the existence of another new piece of malware aimed at Mac machines and users: Keydnap. Keydnap has the ability to steal passwords and keys …

Magnify
Author of potentially malicious OS X Pirrit adware discovered

An unnamed web developer working for Israeli marketing and advertising company TargetingEdge is the creator of the Pirrit adware targeting Mac machines, Cybereason security …

Apple
New Mac OS X backdoor disguised as document converter app

Bitdefender researchers have discovered and analyzed a new, highly dangerous piece of malware targeting Mac systems and users. The malware, dubbed “Eleanor,” opens …

biohazard
The many faces of ransomware

Ransomware has grabbed mainstream media attention recently but it’s nothing new – in fact, its origins can be traced back to floppy disk times. Part of ransomware’s new found …

Locky ransomware variant Zepto hits users via email

A new version of Locky ransomware that has been dubbed “Zepto” due to the .zepto extension added to encrypted files is successfully extorting users around the …

Android Marshmallow
How online learning algorithms can help improve Android malware detection

A group of researchers from Nanyang Technological University, Singapore, have created a novel solution for large-scale Android malware detection. It’s called DroidOL, …

skull
Rooting Hummer malware brings $500,000 per day to its creator

Android malware with device rooting capabilities has been hitting Google Play for a while now, but for users third-party app stores the situation is even more dangerous. The …

Money
How many businesses will pay a ransom if attacked?

Some 84 percent of information technology executives at firms that had not faced ransom attacks said they would never pay a ransom. But among firms that had been attacked, 43 …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools