Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
“Credit card overdue” spam carries malware

Spam emails seemingly coming from a credit card company have been hitting inboxes and trying to scare users into downloading and running the attached malicious file: According …

Russia becomes world leader for malware

The volume of spam in email traffic increased 2.1 per cent in May, when compared with the previous month, making up on average 80.8 per cent of the total. A reduction of …

Phishing operation organizer sentenced

27-year old Kenneth Joseph Lucas II has been sentenced to 13 years in prison for having organized the phishing operation shut down by the FBI in October 2009. Dubbed Operation …

2011 CWE/SANS top 25 most dangerous software errors

SANS and Mitre have released the CWE/SANS Top 25 Most Dangerous Software Errors list for 2011. The list was compiled with the help of a great number of security experts from a …

FBI search for LulzSec hackers leads to Iowa woman

Government and law enforcement agencies’ efforts to discover who is behind the recently disbanded LulzSec have increased as Operation AntiSec still goes strong. And …

45 million U.S. individuals manipulate their identities

When does a little white lie become fraud? An estimated 45 million people in the U.S. have deliberately manipulated their identities in applications for credit, cell phone …

EA password reset due to LulzSec hack?

Electronic Arts (EA) customers have been receiving emails from the company notifying them that their passwords have been reset “to ensure account security”. Graham …

Bitcoin-mining Trojan spotted

Bitcoin has received lately a lot of attention from users and from the media, so it’s no wonder that cyber criminals have also figured out ways to take advantage of its …

Free anti-virus technology for Amazon EC2

AVG announced free anti-virus technology for Amazon EC2 users. The preconfigured software bundled within an Amazon Machine Image (AMI) is now available on the Amazon Web …

iOS and Android more secure than PCs?

While the most popular mobile platforms in use today were designed with security in mind, these provisions are not always sufficient to protect sensitive enterprise assets …

Solution for Popureb rootkit infection

Bootkits are kernel-mode rootkit variants that hide in the computer’s master boot record (MBR) and are notoriously difficult to spot and, sometimes, to eradicate. …

Gannett Government Media user information stolen

The Gannett Government Media family of websites suffered a cyber attack on resulting in unauthorized access to files containing user information. The information in those …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools