Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
ID Network Attributes provides insight into identity risk

ID Analytics launched ID Network Attributes, targeted consumer behavior insights that provide visibility into the risk of an identity or transaction. Available in both Fraud …

Massive Chameleon botnet steals $6M per month from advertisers

Web traffic analytics firm spider.io has discovered a massive botnet that emulates human visitors in order to earn its master(s) over $6 million per month from online …

Malware pushers poison MSN Messenger search results

As the date when the MSN Messenger is scheduled to be phased out speedily approaches, it is getting harder to find an installer for it online, so malware peddlers gave rushed …

Internal name SSL certificates could be exploited for MitM atacks

The Certificate Authority practice of issuing “Internal Name” certificates for private domains which are currently non-resolvable by the Domain Name System could …

Hacking as an act of war

Once the exclusive domain of a small number of geniuses, hacking has gone mainstream as an element of national defense. The United States has established a four-star Cyber …

Security firm publishes details about Java issue, asks for second opinion

Making good on their promise, Security Exploration has published technical details about a Java issue that they consider to be a security vulnerability, but Oracle has …

3,600 organized crime groups active in the EU

In the most detailed study ever undertaken of its kind in the European law enforcement community Europol has identified an estimated 3,600 organized crime groups currently …

Beware of fake Candy Crush apps on Google Play

Whenever a mobile game becomes hugely popular, it also becomes a great way for scammers and malware peddlers to lure users into unknowingly installing malicious apps on their …

The role of critical risks in internal audits

As companies have come to accept that market volatility, complexity, political and regulatory changes are here to stay, internal audit functions have more opportunities to …

Andrew Auernheimer gets prison sentence for AT&T iPad “hack”

Andrew “weev” Auernheimer, security researcher and member of Goatse Security, has been handed a 41-month-long prison sentence for harvesting and publishing emails …

Who is attacking industrial control systems?

Since the discovery of Stuxnet, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) networks have received a fair share of attention from …

Data breaches in higher education

TeamSHATTER reports on data breaches in the higher education vertical throughout the United States. The past year has seen a substantial uptick in the amount of total records …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools