Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Pwn2Own 2015: New rules, prizes, and potential problems

If you intend to participate in the Pwn2Own competition at the CanSecWest 2015 conference on March 18 and 19 in Vancouver, Canada, you would do well to consult with a legal …

Vawtrack malware peddlers turn to malicious macros

Cybercriminals spreading new versions of the Vawtrak banking Trojan are the latest ones to use the once again popular macro-based attack. Popular in the early 2000s, this type …

Beware of fake Windows 10 “activators”

The considerable interest users have shown for testing Microsoft’s Windows 10 Technical Preview version has not passed unnoticed by cyber scammers and malware peddlers. …

Flaw in Netgear Wi-Fi routers exposes admin password, WLAN details

A number of Netgear home wireless routers sport a vulnerability that can be misused by unauthenticated attackers to obtain the administrator password, device serial number, …

Is there an overarching organization that helps Arab hackers?

Trend Micro researchers have unearthed two separate but closely linked malware campaigns attributed to Arab parties. The first one, dubbed Operation Arid Viper, is aimed …

Carbanak cyber gang stole hundreds of millions from banks

Since late 2013, an international cyber criminal group has been targeting banks around the world and has made off with $300 million – possibly even more – by …

Google relaxes its rigid 90-day bug disclosure period

Google has announced that its 90-day vulnerability disclosure period will, from now on, be little longer if the situation warrants it. Earlier this year the company was …

Scammers pushing fake AdwCleaner in active scareware campaign

An active scareware campaign pushing a fake version of the popular freeware spyware removal tool AdwCleaner is targeting Windows users and is trying to get them to fork over …

How to enable two-step verification for iMessages and FaceTime

After having added a two-step verification feature to allow users to secure their iCloud (Apple ID) accounts, and extending the protection to iCloud backups last September, …

VirusTotal sets up huge AV whitelist to minimize false positives

One of the worst things that can happen to a software developer, and especially if they are a small firm or a single individual, is for their program to be falsely detected as …

Attackers can bypass Windows’ protections by changing a single bit

Among the many vulnerabilities that Microsoft patched on Tuesday is one that can be exploited to bypass all Windows security measures by, curiously enough, modifying a single …

Improved Simplocker variant hits Android users hard

Mobile crypto-ransomware Simplocker has evolved, and returning the encrypted files to their unencrypted state is no longer easy as it was. First spotted in June 2014, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools