Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Google Chrome
Tech support scammers leverage “evil cursor” technique to “lock” Chrome

Tech scammers are constantly coming up with new techniques to make users panic and seek their bogus services. The latest one, documented by Malwarebytes researchers, has been …

business
Nearly 15% of US security budgets go to remediating active compromises

Malwarebytes and Osterman Research have polled 900 senior IT decision-makers and IT security professionals in Australia, Germany, the US, UK, and Singapore about the impact of …

danger
Thousands of WP, Joomla and SquareSpace sites serving malicious updates

Thousands of compromised WordPress, Joomla and SquareSpace-based sites are actively pushing malware disguised as Firefox, Chrome and Flash Player updates to visitors. This …

Android
Millions of Android devices forced to mine Monero for crooks

No device is safe from criminals looking to make it stealthily mine cryptocurrency for them. However weak its processing power is, it still costs them nothing. With that in …

MacUpdate
Mac crypto miner distributed via MacUpdate, other software download sites

Software download site/aggregator MacUpdate has been spotted delivering a new Mac crypto miner to users. A new Mac cryptominer was being distributed from hacked MacUpdate …

Google Play
Infosec expert viewpoint: Google Play malware

Researchers routinely discover a variety of malicious apps on Google Play, some of which have been downloaded and installed on millions of devices worldwide. Here’s what …

privacy
Alleged Fruitfly macOS spyware author indicted

The mystery of the Fruitfly macOS malware has apparently been solved: a 28-year-old man from Ohio has been charged on Wednesday of allegedly creating and installing the …

Monero
RIG EK covertly delivers cryptocurrency miners

Malware peddlers have been quick to react to the cryptocurrency boom and to take advantage of every possible way to make other people and organizations mine coins for them. …

Google Chrome
How to keep your browser and devices safe from cryptojackers

Cryptojacking makes surfing the web similar to walking through a minefield: you never know when you might land on a booby-trapped site. Stealthy cryptocurrency mining scripts …

PayPal
Phishers target panicking PayPal users with fake “failed transaction” emails

With the end-of-the-year holidays quickly approaching and many users worrying whether the gifts they bought online will be delivered in time for the festivities, an email from …

SF
Stealthy in-browser cryptomining continues even after you close window

In-browser cryptocurrency mining is, in theory, a neat idea: make users’ computers “mine” Monero for website owners so they don’t have to bombard users …

hand
The Wild West of drive-by cryptocurrency mining

As more and more Coinhive clones continue popping up, chances of users’ CPU power being hijacked for cryptocurrency mining are rising. According to Malwarebytes’ …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools