Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Behavior of Safari on the iPhone could benefit scammers

A behavior of the Safari browser on the iPhone could be used by phishers and scammers to fool users into believing they have landed on a legitimate site, says Nitesh Dhanjani. …

EU investigates Google antitrust violations

The European Commission has decided to open an antitrust investigation into allegations that Google has abused a dominant position in online search, in violation of European …

Fake Trojan Removal Kit runs ThinkPoint rogue

When looking for an anti-malware solution, it pays to be extra careful. Take the example of the “Trojan Removal Kit”. It is offered on fake security scan pages …

Canon image originality verification proven useless

ElcomSoft discovered vulnerability in Canon’s Original Data Security System, a validation system to guarantee authenticity of digital images captured with supported …

Experiment reveals how scammers earn huge money with simple scams

An interesting experiment conducted by UK-based scam-tracking organization Scam Detectives has revealed how online scams can earn scammers a lot of money in a short time …

Android browser flaw allows attackers to access user data

A vulnerability in the Android browser that could allow attackers to download files stored on the mobile device’s or tablet’s SD card has been discovered by …

Tips to protect yourself from Cyber Monday threats

On the Monday after Thanksgiving, more than 100 million Americans will be using their computers and network connections to search for deals and start their holiday shopping, …

Fake Facebook “photo comment” e-mail leads to malware

As Facebook has announced its new messaging system and its deployment in the coming months, online scammers have been trying to use that announcement against unsuspecting …

Trend Micro acquires Mobile Armor

Trend Micro purchased data protection specialist Mobile Armor. Financial terms are not disclosed. The transaction, which is subject to certain closing conditions, including …

Release of diplomatic cables reveals Aurora attacks instigator

As Wikileaks was preparing to release part of the 250,000 diplomatic documents on Sunday, its operators alerted the public via their Twitter account that the whistleblowing …

Week in review: Online shopping safety, malware hybrids and Packet Wars

Here’s an overview of some of last week’s most interesting news, articles and reviews: Google Apps Script API flaw allowed attacker to impersonate Google Details …

Student pleads guilty to helping organize Anonymous DDoS attacks

Steve Slayo, a 19-year old Australian student, has pleaded guilty to having organized a DDoS attack targeting – among others – the websites of the Australian Prime …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools