Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Scammers deliver malware via fake Steam game pages

Aside from being regularly targeted with phishing scams, fake giveaways leading to online surveys, and having malware pushed on them via Steam chat, gamers using the popular …

LG software disables Windows security feature, developer says

LG Split Screen software that comes with the company’s ultra wide monitors stealthily weakens Windows users’ defenses by deactivating the OS’ User Account …

Deadly combination of Upatre and Dyre Trojans still actively targeting users

Upatre (or Waski) is a downloader Trojan that has lately become the malware of choice for cyber crooks to deliver additional, more dangerous malware on users’ computers. …

MitM, DoS bugs in Network Time Protocol squashed

Two vulnerabilities affecting Network Time Protocol (NTP), which is used for synchronizing clocks of computer systems, have been patched and made available in the latest …

Polymorphic Beebone botnet sinkholed in international police operation

On April 8, a global operation targeted the Beebone (also known as AAEH) botnet, a polymorphic downloader bot which installs various forms of malware on victims’ …

Cybercrime gets easier, attribution gets harder

Threat actors are gaining capabilities through the adoption of cutting-edge tools instead of technical expertise, according to Websense. Redirect chains, code recycling and a …

Securing high-risk, third-party relationships

High-profile attacks reveal that malicious hackers target third-party vendors and supply chain partners as a backdoor into their primary target, according to CyberArk …

HardSploit: Dedicated hardware pentesting tool

As Internet of Things adoption is gaining momentum, and we hear time and time again that making it secure will be the biggest challenge, French IT security consultancy Opale …

Russian hackers executed the US State Department, White House network breaches

The October 2014 breaches of some of the computer systems of the US State Department and the White House have been executed by Russian hackers, unnamed US officials familiar …

Large malvertising campaign linked to potentially compromised Google ad reseller

Dutch infosec firm Fox IT has spotted a lage scale malvertising campaign that seems to originate from Bulgarian Google ad reseller EngageLab. The first redirection has been …

New Tor version fixes issues that can crash hidden services and clients

Two new versions of the Tor anonymity software have been released on Tuesday, with fixes for two security issues that can be exploited to crash hidden services and clients …

Malware peddlers exploit fear of Android Installer Hijacking bug

The recently disclosed existence of the “Android Installer Hijacking” vulnerability is being exploited by malware and adware peddlers and online survey scammers, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools