Help Net Security newsletters: Latest news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
Microsoft launches bug bounty program for Online Services

Microsoft has launched another bug bounty program, and this one will focus on its Online Services. Bug hunters are urged to submit vulnerabilities affecting the following …

jQuery.com compromised to serve malware via drive-by download

jQuery.com, the official website of the popular cross-platform JavaScript library of the same name, has been compromised and has been redirecting visitors to a website hosting …

Beware of Apple Wave microwave wireless charging hoax

Excited about the new Wave iPhone wireless charging technology and can’t wait to try it out? Please don’t – it’s a hoax. You risk damaging both your …

Minimizing privacy risks of location data collection

With the advent of smartphones and tablets – devices users often carry with them everywhere they go – collected location data became a valuable source of …

Number of malicious eBay listings rises, accounts are hijacked

Pressure is mounting against eBay to quickly detect and remove bogus listings triggering cross-site scripting flaws to redirect users to phishing and other malicious pages. …

CipherShed: A replacement for TrueCrypt

Ever since TrueCrypt developers terminated the development of the popular encryption utility and announced that it was not safe to use, users who need such a tool have been …

Payment card info of 880k Viator customers compromised

Payment card and personal information of approximately 1.4 million Viator.com customers may have been compromised in a breach that was confirmed late last Friday. The popular …

Home Depot security was anything but, say former employees

Bit by bit, information about the Home Depot security breach is coming to light, and the picture it paints is extremely unflattering for the retailer. The latest insight comes …

Microsoft kills off its Trustworthy Computing Group

Microsoft’s Trustworthy Computing Group is headed for the axe, and its responsibilities will be taken over either by the company’s Cloud & Enterprise Division …

Google will display Android devs’ physical address

Developers/publishers of paid Android apps and apps that feature in-app purchases will, by the start of next month, be required to add a physical contact address to their …

Apple drops the “warrant canary” from transparency report

In the wake of the change of Apple’s Privacy Policy, and the encryption technology used in iOS 8 that makes it “not technically feasible” for Apple to …

Simply Secure aims to make security technology usable

Just two days after they joined a collaboration that will focus on making open source “easier for everyone,” Google and Dropbox have announced that they will be …

Don't miss

Cybersecurity news