Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
NSA
NSA spied on world leaders, UN, EU officials

A set of highly classified documents recently published by WikiLeaks show how the NSA spied on a number of high ranking officials of the UN, UNHCR, WTO, NATO, the EU and …

MouseJack
MouseJack: Remote exploitation via radio frequencies

Bastille has uncovered a massive vulnerability in wireless mice and keyboards that leaves billions of PC’s and millions of networks vulnerable to remote exploitation via radio …

Japan
Japanese critical infrastructure under targeted attack

Cylance revealed a multi-year, multi-attack campaign against the Japanese critical infrastructure. Their research uncovers how a well-organized and well-funded threat group, …

connection
Working towards a common set of IoT standards

Major industry leaders who are invested in the future of the Internet of Things, announced they will unify as the Open Connectivity Foundation (OCF), an entity whose goal will …

illusive networks
Attacker View exposes hidden cyber attack paths

Illusive networks launched illusive 3.0 with Attacker View, a technology that enables IT security professionals to view their corporate network from an attacker’s …

Library
Sensitive child profiles, private messages exposed online

Security researcher Chris Vickery has discovered another database containing sensitive user data exposed online (i.e. accessible via Internet). Leveraging Shodan, he unearthed …

German police allowed to use its own “federal Trojan”

The German Interior Ministry has approved for investigative use a spying Trojan developed by the German Federal Criminal Police (a so-called “federal Trojan”). In …

code
Source code of “game changer” Android banking malware leaked online

If you ask users and malware analysts, the Android threat landscape is wide enough, but unfortunately it’s likely to get even wider as source code for the GM Bot banking …

Android
Mobile banking Trojan bypasses Google Play security

The Acecard malware is capable of attacking users of nearly 50 different online financial applications and services and is able to bypass Google Play store security measures, …

world in hand
Perceptions and buying practices of infosec decision makers

CyberEdge Group surveyed 1,000 IT infosec decision makers and practitioners from 10 countries, five continents, and 19 industries, and unsurprisingly, the news is not good. In …

AT&T IoT report
Most businesses are considering or implementing IoT

The Internet of Things (IoT) is growing at an exponential rate. By 2020, some 50 billion devices will connect to the Internet and the economic value created by IoT could be …

ecommerce
Ecommerce fraud surges 163%

The worst fears of online retailers has been confirmed with data just released today: in 2015, the number of attacks by fraudsters was up 163 percent – growing two and a half …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools