Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Students create open source, cross-platform memory scanning tool

Mozilla has unveiled the result of a successful project executed by a group of Computer Science students from Argentina: it’s called Masche, and it’s an open …

Cutting-edge security research comes to Amsterdam

Held once again at De Beurs van Berlage, HITB2015AMS takes place from the 26-29 May 2015 and runs alongside HITB Haxpo, a 3-day technology expo for hackers, makers, builders …

Online trust is at the breaking point

IT security professionals around the globe believe the system of trust established by cryptographic keys and digital certificates, as well as the security of trillions of …

Week in review: Shadow IT, crypto-ransomware goes after gamers, and the security of smartwatches

Here’s an overview of some of last week’s most interesting news and articles: Hack yourself first: How we can take the fight to the black hats Threats are no …

Facebook worm spreads by leveraging cloud services

Facebook users are in danger of having their computers turned in a bot by a worm that spreads via the social network. The worm, identified as belonging to the Kilim malware …

Critical hole in popular WordPress SEO plugin allows SQLi, site hijacking

Another highly popular WordPress plugin has been found sporting a cross-site request forgery flaw that can be exploited to mount a blind SQL injection attack, and could also …

Defending against PoS RAM scrapers

Stealing payment card data has become an everyday crime that yields quick monetary gains. Attackers aim to steal the data stored in the magnetic stripe of payment cards, …

Most businesses fail interim PCI compliance assessment

Nearly 80 percent of all businesses fail their interim PCI compliance assessment, leaving them vulnerable to cyberattacks, according to Verizon’s 2015 PCI Compliance …

Listen to your employees or deal with shadow IT

Data leakage, compliance breaches, business inefficiency and hidden costs are just some of the risks organizations are leaving themselves open to by not meeting the IT demands …

Huge IT Slider WordPress plugin opens SQL injection hole

The 50,000+ active users of the Huge IT Slider WordPress plugin are advised to update to the latest version, as it closes a vulnerability that can be exploited by website …

New crypto-ransomware encrypts video games files

A new piece of ransomware that (mis)uses the Cryptolocker “brand” has been analyzed by Bromium researchers, and they discovered that aside from the usual …

CS:GO players targeted with phishing attempt, malware

Typosquatting is an effective means to trick users into believing they have landed on the legitimate site they wanted to visit, so it’s no wonder that it’s often …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools