Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Skype
T9000 backdoor steals documents, records Skype conversations, victims’ actions

A new backdoor Trojan with spyware capabilities is being used in targeted attacks against organizations based in the United States. It has been dubbed T9000, since it’s …

eye
Banning encryption is useless when IoT devices can spy on users

For a while now the US intelligence and law enforcement community has been complaining about the rise of end-to-end encryption, and how it will prevent them from tracking …

linux tux
New Linux Trojan performs system reconnaissance

A new Linux threat has been identified by Dr. Web researchers. Dubbed Linux.Ekoms.1, this Trojan’s apparent function is to discover details about the system it has …

Red door
Most IT pros oppose government backdoor access

Close to two-thirds of global IT professionals oppose giving governments backdoor access to encrypted information systems, and 59% feel that privacy is being compromised in an …

Glass
BlackEnergy APT is back, deleting files and killing computer systems

The BlackEnergy APT – or SandWorm group, as some researchers call it – has been active since 2007 (at least). Its past exploits include cyber-espionage campaigns …

Revealed: What info the FBI can collect with a National Security Letter

After winning an eleven-year legal battle, Nicholas Merrill can finally tell the public how the FBI has secretly construed its authority to issue National Security Letters …

A Jihadi Help Desk assists ISIS terrorists and sympathizers with encryption?

The recent Paris attacks by ISIS have become the perfect pretext for governments to resume their attack on encryption.Even though the New York Times pulled an article blaming …

Cross-device tracking via imperceptible audio beacons threatens user privacy

As consumers use multiple devices through the day, and tracking cookies become increasingly less effective, the advertising industry is looking for new ways to track …

US DOJ admits that Stingrays can be used to intercept call and SMS content

After a battling the US Department of Justice in a court for two and a half years, the American Civil Liberties Union of Northern California has emerged victorious and has …

How can we decide on surveillance and privacy when we can’t see the whole picture?

“The surveillance of communications faces a legitimization crisis,” says James Losey, a fellow with the Open Technology Institute, the technology program of the …

CCTV botnets proliferate due to unchanged default factory credentials

Incapsula researchers have uncovered a botnet consisting of some 9,000 CCTV cameras located around the world, which was being used to target, among others, one of the …

Leaked Hacking Team emails show Saudi Arabia wanted to buy the company

Emails stolen in the Hacking Team breach and leaked online by the still unknown attackers continue to be analyzed, and offer insight into the inner workings and controversial …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools