Help Net Security newsletters: Latest news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
Facebook open sources Proxygen, C++ HTTP framework + server

After having open sourced the OS analysis tool osquery a week ago, Facebook has announced on Wednesday that Proxygen – a collection of C++ HTTP libraries and an …

WireLurker: Unprecedented iOS, OS X malware hits users

Palo Alto Networks researchers have unearthed a new family of Apple OS X and iOS malware that is able to compromise even non-jailbroken iOS devices through enterprise …

New technique makes phishing sites easier to create, more difficult to spot

Researchers have spotted a new technique used by phishers which could trick even more users into believing they are entering their information in a legitimate web form. …

Linksys SOHO router owners urged to patch multiple vulnerabilities

Owners of a number of Linksys small office/home office routers have been urged last week to update their device’s firmware in order patch two vulnerabilities, one of …

Which messaging technologies are actually secure?

The Electronic Frontier Foundation has evaluated 39 chat clients, text messaging apps, email apps, and technologies for voice and video calls, and found that only six of them …

Backoff PoS malware becomes stealthier, more difficult to analyze

The Backoff Point-of-Sale RAM scraper malware has become even more difficult to detect and analyze, warns Fortinet researcher Hong Kei Chan. Even after the US DHS and US CERT …

Google open sources nogotofail, a network traffic security testing tool

In their quest to make users, the Internet, and digital devices in general more secure, a number of big Internet companies have recently announced a new collaboration that …

OS X Yosemite sports serious privilege escalation bug

A Swedish researcher has unearthed a serious bug that affects the newest version of OS X – version 10.10, or Yosemite – and which could allow attackers to gain …

Ideas
Hacking and Penetration Testing with Low Power Devices

This book is primarily intended for penetration testers who want to widen their skill set to include the knowledge of how to perform testing with small, low-powered devices …

Flaw in Visa’s contactless payment system could lead to fraud

Researchers from Newcastle University have discovered a serious flaw in Visa’s contactless credit cards which could allow attackers to siphon large amounts of money off …

Researchers audit the TextSecure encrypted messaging app

A group of German researchers have audited TextSecure, the popular open source encrypted messaging application for Android, and the news is good. After fixing a particular …

Facebook embraces Tor users, sets up onion address

While in the past Facebook has occasionally blocked Tor connections because of security considerations, the company has decided it will help Tor users from now on, and …

Don't miss

Cybersecurity news