Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Adobe AIR
Android apps based on Adobe AIR SDK send out unencrypted data

Developers using the Adobe AIR SDK should update to the latest version of the software development kit and rebuild the apps as soon as possible if they don’t want their …

Google Nexus
Hack a Nexus from afar, get $200,000

Google has issued a challenge to bug hunters around the world: find a vulnerability or bug chain that achieves remote code execution on multiple Android devices knowing only …

American Express
Amex users hit with phishing email offering anti-phishing protection

American Express users are being actively targeted with phishing emails impersonating the company and advising users to create an “American Express Personal Safe …

ClixSense
6.6 million ClixSense users exposed in wake of site, company hack

If you’ve ever registered with ClixSense – and millions have – you can consider all your personal information shared with the service compromised. The …

Chevrolet Suburban
GM recalls 3.6 million cars due to potentially fatal software defect

Last Friday, General Motors has announced that the owners of some 3.64 million of its vehicles will have to come in for a re-flash of their sensing and diagnostic module (SDM) …

city
Improve SecOps by making collaboration easier

There’s one word that we’ve consistently been hearing from information security pundits year after year: Collaboration. More often than not, they were talking …

Stingray
Stingray use lacks transparency and meaningful oversight

Cell-site simulators – aka Stingrays, aka IMSI catchers – are widely used by US law enforcement, usually without a warrant that such type of surveillance should …

Gold
Man hacked, blackmailed gold bullion trading firm

25-year-old Adam Penny hacked the systems of an unnamed gold bullion trading firm, and used the stolen information about gold deliveries to intercept them before they are …

emergency
US 911 emergency system can be crippled by a mobile botnet

What would it take for attackers to significantly disrupt the 911 emergency system across the US? According to researchers from Ben-Gurion Univerisity of the Negev’s …

MySQL
MySQL 0-day could lead to total system compromise

Researcher Dawid Golunski has discovered multiple severe vulnerabilities affecting the popular open source database MySQL and its forks (e.g. MariaDB, Percona). One of these …

Danger
Macro-based malware evolves to bypass traditional defenses

Macro-based malware is growing into full-featured malware capable of detecting and bypassing traditional security tools, Barkly researchers have discovered. Macro-based …

healthcare
Compromised electronic health records may haunt you forever

A recent report on the Deep Web black market for electronic health records (EHRs) by researchers affiliated with the Institute for Critical Infrastructure Technology has …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools