Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
pyramid
Why a layered defense is your best protection against malware

As long as there is software there will be vulnerabilities and those vulnerabilities will be exploited. It’s a bold statement, and oddly enough technically incorrect. In …

vault
Ransomware attacks escalate, companies largely unprepared

Ransomware attacks against endpoints have recently taken place against hospitals in the US and Germany. Attacks have increased in severity to the point that the FBI issued an …

business
Exposing the Cybercrime as a Business model

Trustwave released a new report which reveals the top cybercrime, data breach and security threat trends from 2015. Experts gathered real-world data from hundreds of breach …

javascript warning Windows
Beware of emails with JavaScript attachments!

Malware peddlers are always looking for the next trick to get users to infect their computers. According to Microsoft and other sources, the current latest trick is malicious …

facepalm
Solutions for the hijacked websites problem

According to a group of researchers from Google and University of California Berkeley, roughly 16,500 new sites get hijacked each week and start serving drive-by-malware or …

Blackhole exploit kit author sentenced

Dmitry Fedotov, aka “Paunch”, the creator of the infamous Blackhole and Cool exploit kits, has been sentenced to spend 7 years in prison, Russian news agency TASS …

abstract lights
Public institutions targeted with shape changing Qbot malware

A new strain of Qbot, malicious software that steals user credentials and creates backdoors on targeted devices, has infected over 54,000 PCs in thousands of organisations …

success
Identify the ransomware you’ve been hit with

Michael Gillespie, a coder that has created a password generator for unlocking the files stashed in a password-protected archive by the CryptoHost ransomware, has also created …

open lock
CryptoHost locks files, but you can get them back

If you’re a user whose files are held for ransom by the CryptoHost (aka Manamecrypt) ransomware, despair no more about getting them back without paying for it – …

maktub ransomware
Beware of phishing emails sporting your home address!

The latest (likely very successful) ransomware delivery campaign takes the form of spear-phishing emails targeting specific individuals and, for added credibility, includes …

samas-ransomware
Samas ransomware enters hospitals through vulnerable servers

There’s hardly a day anymore that we don’t hear about a hospital being hit with ransomware. But while most have been infected via phishing emails carrying or …

payment card
Carders use custom built POS malware to hit US retailers

Crypto-ransomware might be the most prominent type of malware these days, but that doesn’t mean that criminals have stopped using other kinds. According to FireEye …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools