
VoIP phones can be turned into spying or money-making tools
A security vulnerability present in many enterprise-grade VoIP phones can easily be exploited by hackers to spy on employees and management, says security consultant Paul …

Kotlin programming language for JVM and Android reaches version 1.0
Kotlin is an open source programming language for JVM and Android that combines OO and functional features and is focused on interoperability, safety, clarity and tooling …
UK security tribunal decides GCHQ’s hacking is legal
The UK GCHQ intelligence agency’s hacking of computers, mobile devices, smart devices, and computer networks has been ruled to be legal, no matter where it happens in …

Hollywood hospital’s systems held hostage by hackers
The Hollywood Presbyterian Medical Center, an “acute-care facility” located in Los Angeles, has had its computer systems compromised by hackers. The attackers are …

Security guidance for the Internet of Things
Embedded systems and connected devices are already deeply woven into the fabric of our lives, and the footprint is expanding at a staggering rate. Gartner estimates that 4.9 …

Teenage admin of anonymous XMPP service arrested in connection to fake bomb threats
The teenage administrator of the Darkness.su XMPP service has been arrested last Monday by the French police, in connection to the wave of false bomb threats that were made …

Anonymous networks 101: Into the heart of the Darknet
Here’s a riddle: What’s hidden in plain sight Stretches the entire known world Vilified and Adored Born from a secret US Government project Maintains secret societies Requires …

Welcome to the new Help Net Security
We’re all about keeping you updated with important security stories, but this time around we have some news about us. During the weekend we rolled out a brand new version of …

Week in review: Dyre gang takedown, and the most popular hacking methods
Here’s an overview of some of last week’s most interesting news and articles: Know your enemy: The most popular hacking methods Outsiders want to become insiders …

Beware of Airbnb-themed phishing schemes
Airbnb-themed phishing scams do not crop up often, but customers of the service should be aware of the possibility of getting their login credentials stolen and misused. …

Government-mandated crypto backdoors are pointless, says report
If you needed another confirmation that government-mandated backdoors in US encryption products would only serve to damage US companies’ competitiveness without actually …

Netflix-themed phishing, malware supply black market with stolen credentials
As the Netflix movie streaming service spreads all over the world, the number of users rises, as well as the number of those who wish to use it but don’t want to pay for …
Featured news
Resources
Don't miss
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)
- Exposure management is the answer to: “Am I working on the right things?”
- Cyberattacks are changing the game for major sports events
- Can your security stack handle AI that thinks for itself?
- July 2025 Patch Tuesday forecast: Take a break from the grind