Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
biohazard
Godless Android malware offers serious firepower to a botnet herder

One of the most concerning characteristics of the Godless malware is the ability to receive remote instructions on which app to download and install on mobile devices, without …

Globe
IoT threats drive global embedded security shipments

With the rise of IoT, pressure to mitigate cyber risks in connected devices is mounting. Though security is a big concern, connected devices from autonomous vehicles to smart …

Nexus
Your nearest and dearest are snooping on your phone

If you needed one more reason for protecting your phone with a passcode or fingerprint, here it is: there’s a good chance that one or more of the people close to you …

USA flag
154 million US voter records exposed following hack

MacKeeper security researcher Chris Vickery has discovered yet another database containing voter profiles of US citizens, accessible to anyone who stumbled upon it or knew …

tools
Severe flaws patched in libarchive, dependent projects urged to follow

Three severe bugs that could be easily exploited to perform arbitrary code execution have been patched with version 3.2.1 of the libarchive open source multi-format archive …

(IN)SECURE Magazine 50
(IN)SECURE Magazine issue 50 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 50 has been released today. Table of contents …

cloud
Cloud-first is replacing the defensive no-cloud stance

By 2020, a corporate “no-cloud” policy will be as rare as a “no-Internet” policy is today, according to Gartner. Cloud-first, and even cloud-only, is …

Drone
FAA finalizes operational rules for drones

The Department of Transportation’s Federal Aviation Administration has finalized the first operational rules for routine commercial use of small unmanned aircraft systems (UAS …

key
ApocalypseVM ransomware decrypter released

AV company Emsisoft has added yet another ransomware decrypter tool to its stable: a decrypter for ApocalypseVM. The tool works on the latest versions of the ransomware in …

fake tech support isp
Tech support scammers impersonate victims’ ISP

Tech support scammers have switched from cold calls to pop-ups ambushing users online, seemingly coming from the victims’ ISP. In the US and Canada, Verizon, AT&T …

google prompt
Google’s new authentication option: a tap on the screen

Google knowns that usability is a pre-requisite for security, so they’ve come up (yet again) with a new option within the 2-step verification feature for Google …

security camera
Unsecured security cameras lead to privacy erosion

The results of a recent analysis of some 6,000 open security cameras across the United States has shown that 15 percent of them are located in users’ private homes. Open …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools