Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
samsung camera
Samsung SmartCam can be easily hijacked

At least one type of Samsung SmartCam cameras can be taken over by remote attackers who just need to know the vulnerable camera’s IP address. The remote code execution …

WhatsApp
UK users bombarded with scammy offers via Facebook, WhatsApp

Since the beginning of the year, survey scammers have mounted a veritable onslaught against Facebook and WhatsApp users from the UK. The lure comes in the form of a fake free …

fingerprint
Accurate cross-browser fingerprinting is possible, researchers show

A group of researchers have come up with a browser fingerprinting technique that can allow interested parties to “identify” users across different browsers (on the …

magnifying glass
Security audit of Dovecot mailserver reveals good security practices

Dovecot – a popular open source IMAP and POP3 server for Linux/UNIX-like systems – is as secure as its developers claim it is. A security audit performed by German …

keys
Key Transparency: A secure directory of public encryption keys

Google has released Key Transparency, an open source public directory meant to simplify the discovery of intended recipients’ public encryption key. The project is still …

documents
SWIFT systems of three Indian banks compromised to create fake trade documents

Since last year’s revelation that attackers have compromised SWIFT software of Bangladesh’s central bank and used it to perform fraudulent transfers worth tens of …

Gmail
New Gmail phishing technique fools even tech-savvy users

An effective new phishing attack is hitting Gmail users and tricking many into inputing their credentials into a fake login page. How the attack unfolds The phishers start by …

password
The most common passwords of 2016

Despite having been predicted many times, the demise of the password as the preferred authentication method is still far off, as it’s difficult to beat its ease of use. …

Adobe Reader
Adobe quietly bundles data-collecting Chrome extension with latest Reader update

Chrome users who have installed the latest Adobe security updates have also been unknowingly saddled with a browser extension (“Adobe Acrobat”) that can collect some of their …

fire
Mobile forensics firm Cellebrite confirms data breach

Israeli mobile forensics firm Cellebrite has announced that it has suffered a data breach following an unauthorized access to an external web server. “The impacted …

shadow
Shadow Brokers say goodbye, leak a batch of Windows hacking tools

The Shadow Brokers, a group (?) of hackers that has made a big splash in August last year by leaking and offering for sale exploits supposedly stolen from the infamous …

Merlin
FDA urges patients to implement patch to secure their cardiac implants

Patients who have been implanted with pacemakers and defibrillators manufactured by US-based St. Jude Medical are urged to make sure that their Merlin@home Transmitter unit is …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools