Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Brute-forcing wireless access points made easy

A design flaw in the WiFi Protected Setup that can allow attackers to easily brute-force their way into wireless network devices has been discovered and made public by …

Beware of password-protected documents carrying malware

Password-protected malicious attachments delivered via email are not a new occurrence – we have recently witnesses the tactic being used in the so-called Nitro attacks. …

Data-stealing Android Trojan masquerades as greeting-sending app

Text messages have largely replaced seasonal (and non) greeting cards, and there are mobile apps out there that let you send prewritten witty/sweet messages to friends and …

Analysis of Facebook attacks

Commtouch published a comprehensive analysis of scores of malicious Facebook activities during the past year. Affiliate marketing sites are the final destination in …

SCADA and PLC vulnerabilities in correctional facilities

Many prisons and jails use SCADA systems with PLCs to open and close doors. Using original and publicly available exploits along with evaluating vulnerabilities in electronic …

Microsoft provides protection for ASP.NET vulnerability

Microsoft published Security Advisory 2659883 to provide a workaround to help protect ASP.NET customers from a publicly disclosed vulnerability that affects various Web …

Emerging threats to become major players in 2012

Emerging threats from 2011 are on track to become the major players for cyberactivity in 2012, including mobile banking, “legal” spam and virtual currency. McAfee …

Mac management tools from Google

Google’s internal Macintosh Operations team is starting to release the utilities, tools, and scripts for managing and tracking a fleet of Macintoshes in a corporate …

Pentagon officials allowed to use Android

US Department of Defense officials that need a mobile device are no longer restricted to using a BlackBerry, reports Muktware. The Pentagon has now also allowed the use of …

Anonymous targets security think tank, pilfers sensitive data

The hacking collective Anonymous has downed the website and stolen client information belonging to Stratfor (Strategic Forecasting Inc.), a US-based research group that …

Data-stealing malware growth spikes

The propagation of some forms of crimeware surged in the half-year period ending in June, 2011 with data-stealing malware reaching and maintaining a new plateau of contagion, …

What’s in store for us in 2012

Looking forward into what lies ahead for us in 2012, Zscaler offers predictions for the upcoming threat landscape. 1. Mobile: With WebOS now officially an orphan, Blackberry …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools