Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
D-Link routers vulnerable to DNS hijacking

At least one and likely more D-Link routers as well as those of other manufacturers using the same firmware are vulnerable to remote changing of DNS settings and, effectively, …

Swiss users inundated with malware-laden spam

Swiss users are being heavily targeted by a number of spam campaigns delivering the Tiny Banker (TinBa or Busy) e-banking Trojan. Starting with Tuesday, the spammy emails seem …

Market share of antivirus vendors and products

A new report from OPSWAT determined the market share for the top five antivirus vendors with RTP enabled. It includes: Avast – 21.4% Microsoft – 19.4% AVG – …

Reactions to the serious vulnerability found in Glibc

The Qualys security research team has found a critical vulnerability in the Linux GNU C Library (glibc), that allows attackers to remotely take control of an entire system …

Critical BlackPhone bug allows attackers to spy on users

BlackPhone, a mobile phone aimed at users who want to keep their communications secure from mass surveillance attempts, is affected by a critical security vulnerability that …

New OS X Yosemite version fixes critical security issues, including Thunderstrike

Apple has released the latest version of OS X Yosemite (v10.10.2) and the first security update (2015-001) for this year, and among the problems fixed is one affecting the CPU …

How important is online privacy?

Consumer online privacy concerns remain extremely high with 92 percent of American internet users worrying to some extent about their privacy online – the same …

Hijacking drones with malware

A recent incident at the White House showed that small aerial vehicles (drones) present a specific security problem. While in this particular case the actual danger turned out …

Multiple vulnerabilities in the FreeBSD kernel code

Francisco Falcon from the Core Exploit Writers Team found multiple vulnerabilities in the FreeBSD kernel code that implements the vt console driver (previously known as …

IBM’s sophisticated cryptographic algorithm protects your identity

IBM researchers revealed plans for a cloud-based technology, called Identity Mixer, that uses a cryptographic algorithm to encrypt the certified identity attributes of a user, …

Threats and technologies of a shifting data security landscape

With every email now a target and every piece of data at risk, the need for data protection maturity has never been higher. According a new study released by Lumension, IT …

IoT security and privacy best practices

In a report on the Internet of Things (IoT), the staff of the Federal Trade Commission recommend a series of concrete steps that businesses can take to enhance and protect …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools