Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Attackers are taking advantage of old vulnerabilities

FortiGuard Labs observed a 30 percent increase in mobile malware in the labs over the last six months. The team is now seeing more than 1,300 new samples per day, is currently …

Enterprises in denial regarding network security

Many enterprises possess an unrealistic confidence surrounding the security of their networks. According to a Lancope survey, more than 65 percent of IT/security professionals …

Cross-platform backdoor created with RAT available online

For malware authors and attackers, the ideal malware is that which works on as many platforms as possible. As Java is used in a wide variety of computing platforms, it stands …

Tor users targeted with spyware following anonymous Web-host shutdown

The news that the alleged owner of Freedom Hosting, the internet host for a great number of Tor hidden services, has been arrested and is accused of distributing and promoting …

Working as an ethical hacker

The term “ethical hacker” as it is used today is, if you ask me, somewhat imprecise. After all, a hacker in it for the money could be said to follow his or her own …

Free ebook: Introducing Windows Server 2012 R2 Preview Release

Microsoft released a free ebook by Mitch Tulloch with the Windows Server Team. Introducing Windows Server 2012 R2 Preview Release introduces new features and capabilities, …

Cybercriminals are doing a better job than the companies they target

What can you learn from reading the exploits of the most successful hacking ring ever brought to justice? Recently, the US Attorney’s Office in NJ unsealed their …

Russians responsible for 30% of mobile malware

Lookout investigated 10 Russian-based organizations, uncovering that the mobile malware industry in Russia has become organized and profitable. These malware businesses …

Collaborative threat intelligence platform from ThreatConnect

ThreatConnect launched the ThreatConnect Platform, a combination of analytical tools that assist in finding and analyzing threat indicators and community-based sharing …

Week in review: iPhone charger, PLC, femtocells hacks, and the future of phishing

Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: To achieve good security, you need to focus on business In September …

FBI uses malware to spy on suspects via their phones

The FBI has been known to use malware to spy on suspects via their computers but mobile phones make even better sources of information. Just think about it: the great majority …

Engineers demonstrate PLC hack on mock oil rig

The widely known Stuxnet incident made sure that the mere mention of SCADA vulnerabilities is enough for security experts to pause. After all, sabotaging industrial control …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools