Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Top 100 Android apps hacked in 2013

One hundred percent of the Top 100 paid Android apps and 56 percent of the Top 100 paid Apple iOS apps have been hacked, according to Arxan. As the growth in mobile innovation …

Companies embrace the cloud and BYOD, can’t control them

Cloud applications and mobile devices are increasing security and compliance risk at many US and UK enterprises. Alarmingly, the SailPoint survey reveals that while global …

One in four UK consumers have had online accounts hacked

As user engagement with ecommerce sites and online services inevitably increases in the run up to Christmas, almost a quarter (24 per cent) of UK consumers have had their …

Top security trend predictions for 2014

AppRiver released its list of the top IT security trend predictions for 2014. They predict organizations will see the following in 2014: State-sponsored attacks and cyber …

Flaw in Nvidia’s rendering software allows hijacking of “computer farms”

A vulnerability in Nvidia mental ray, an extremely popular 3D-rendering software that is often used on “render farms”, could allow attackers to take control of …

Facebook users hit with phishing and malware combo attack

An interesting phishing / malware delivery campaign has been spotted targeting Facebook users. It all starts with a message from a Facebook friend, claiming that the user or …

64-bit Zeus Trojan version found and analyzed

Infamous banking Trojan Zeus can now be used to steal information via 64-bit versions of web browsers, and has the capability of connecting to its C&C server via the Tor …

What do people want to hide on their smartphone?

More than half of Americans (52%) would be embarrassed about friends or family seeing certain files or documents on their smartphone, according to Clean Master. The number one …

How cyber squatters and phishers target antivirus vendors

Illegal online activities such as phishing and typosquatting are growing at an alarming rate. To understand the issue in detail High-Tech Bridge analyzed 946 domains that may …

Young professionals exposing workplaces to cyber attack

Low cyber-threat awareness amongst Gen-Y professionals coupled with blasé attitudes towards cyber security are leaving organizations across the country exposed to attack and …

Flawed Android app devkit puts users in danger of MitM attacks

In this age of prevalently free software and services, it’s difficult to make users pay for apps, and especially so in the Android ecosystem. Consequently, mobile app …

Energy-efficient bcrypt cracking

Bcrypt is a password hashing scheme based on the Blowfish block cipher. It was designed to be resistant to brute force attacks and to remain secure despite of hardware …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools