Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
China executes MITM attack against iCloud and Microsoft account holders

China-based Internet users are in danger of getting their iCloud and Windows Live accounts hijacked and all the information in them slurped up by the Chinese authorities, web …

Hackers make companies’ phones call premium-rate numbers, cost them billions

Attackers hacking into companies’ phone network, using it to place mass phone calls to premium-rate telephone numbers is not a new occurrence – they have been …

OS X Yosemite comes with POODLE and Shellshock patches

Last week Apple released a new version of its operating system to consumers. What’s interesting to note is that OS X 10.10 (aka “Yosemite”) also came with a …

Facebook trawls through paste sites for compromised credentials

In the spirit of November as National Cyber Security Awareness Month, Facebook security engineer Chris Long shared how the company discovers that some of its users’ …

Infographic: A brief history of malware

From simple disk-to-disk attacks in the 80s to email viruses in the modern day, malware is here to stay. This ESET infographic offers you insight about the origins and …

Week in review: POODLE bug, Microsoft patches a slew of 0-days exploited in the wild

Here’s an overview of some of last week’s most interesting news and articles: Identifying deceptive behavior in user-generated content In this interview, JT Buser, …

Tor Browser 4.0, Tails 1.2 are out

The Tor Project has released version 4.0 of its popular eponymous browser that allows users to use the Internet anonymously and privately, and to circumvent online censorship …

Beware of Ebola-themed phishing, malware campaigns and hoaxes

US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme. “Phishing emails may contain links that direct …

Targeted attack protection via network topology alteration

When it comes to targeted attacks, attackers are not omniscient. They need to gather information in the early stages to know the target they may gather information from …

EMEA threat landscape: APTs nearly doubled

Malware attacks – especially advanced targeted attacks – have nearly doubled in the EMEA region in the first half of 2014, say the results of the analysis of …

The impact of disconnected security strategies

39% of organizations’ IT departments are spending too much time managing their security network and manually tackling threats, according to McAfee. Almost a third of IT …

GFI Software redesigns WebMonitor 2015

GFI Software announced GFI WebMonitor 2015, the latest version of the company’s Web filter, management and security solution for businesses. GFI completely redesigned …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools