Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Gamers hit with trojanized versions of official League of Legends releases

Computer security experts often advise to users to download games, apps, documents, software and software updates directly from the original source (the manufacturer) or from …

Cybersecurity readiness: Widening gulf between perception and reality

Attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity, according to Cisco. Defenders, namely, …

SQL injection vulnerabilities surge to highest levels in three years

UPDATE: Tuesday, 20 January 2015, 1:10 PT – Jericho from Attrition.org has written an insightful post that essentially debunks the data released by DB Networks. …

Biometric authentication app downloads to reach 770 million by 2019

More than 770 million biometric authentication applications will be downloaded per annum by 2019, up from just 6 million this year. This will reduce dependence on alphanumeric …

North Korean networks compromised by NSA for a while now

A report based on documents from Edward Snowden’s NSA trove and published by Der Spiegel on Saturday described the extensive cyber spying and sabotaging capabilities of …

2+ million US cars can be hacked remotely, researcher claims

Security researcher Corey Thuen has made a surprising discovery when he reverse-engineered the firmware of the Snapshot tracking dongles that US-based Progressive Insurance …

Lizard Squad’s DDoS website hacked, unencrypted customer database stolen

The hacker group that calls itself the “Lizard Squad” has received another serious blow: LizardStresser(dot)su, the website where customers go to rent their DDoS …

Guide on actionable information for security incident response

ENISA publishes a good practice guide on Actionable Information for Security Incident Response, aiming to provide a picture of the challenges national CERTs and other security …

The rise of mercenary hacker crews offering Espionage-as-a-Service

Although the Sony attack was loud, damaging and hugely embarrassing to the company, the bigger threat is from mercenary hacker crews who steal billions of dollars of valuable …

The cost of malware containment

Enterprises spend $1.3 million a year dealing with false positive cyber security alerts, which equals nearly 21,000 hours in wasted time. The Ponemon Institute surveyed more …

Week in review: Google discloses Windows flaw, French sites under attack, Android users in danger

Here’s an overview of some of last week’s most interesting news and articles: LizardSquad’s DDoS service is powered by hacked home routers The preponderance …

UK PM Cameron demonizes encryption, US report says it’s vital

When British Prime Minister David Cameron announced on Tuesday his plan to introduce new surveillance powers in the UK by forcing businesses to plant backdoors in their …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools