Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
There’s a new banking Trojan in town

A new piece of banking malware is being delivered via tax- and invoice-themed phishing campaigns, Danish security company CSIS is warning. Dubbed “Dyreza,” the …

Employees take too many risks with Wi-Fi security

UK employees are potentially putting their companies at risk of cyber-attack when using mobile devices for work purposes while on holiday or on a short break, new research has …

Java program to reverse Android ransomware damage

University of Sussex student Simon Bell has reverse-engineered the Android Simplocker (Simplelocker) ransomware, and has created a Java program that can be converted into an …

Could you maintain security in event of IT failure?

A study investigating the priorities for the UK and Ireland’s top banks and insurance companies has revealed low confidence in the ability to remain secure in the event …

DEF CON contest to help track down illegal robocalls

The Federal Trade Commission is looking to expand the technological arsenal that can be used in the battle against illegal phone spammers by challenging DEF CON 22 attendees …

Financial ransomware now targeting U.S. users

Although the GameOver Zeus botnet and CryptoLocker ransomware have been disrupted, it is still too early for a victory celebration. First, the two week deadline expires on …

Service providers need different core competencies in a digital world

Organizations’ emerging transformation to digital business models is driving the need for greater IT agility to meet changing business strategies and requirements in a …

Analysis of 3000 vulnerabilities in SAP

According to official information from SAP portal, more than 3000 vulnerabilities have been closed by SAP. Here are 6 highlights from a research conducted by the ERPScan team …

Week in review: Replicating NSA’s gadgets using open source, World Cup-themed threats, and life after TrueCrypt

Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Replicating NSA’s gadgets using open source In this …

Use your own encryption keys for Amazon S3 storage

Amazon Web Services has some good news for users of S3, its popular online file storage web service: they can now use their own encryption keys to protect their data at rest. …

Microsoft says user content won’t be used for targeted advertising

Microsoft has announced several changes to its Microsoft Services Agreement (MSA), and the most important one is that they have now put in writing that they are not using …

One-third of cyber attacks take hours to detect

More than one-third of cyber attacks take hours to detect. Even more alarming, resolving breaches takes days, weeks, and in some cases, even months. Despite increased resource …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools