Help Net Security newsletters: Latest news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
Google Apps scripts can be easily misused by scammers

Andrew Cantino, VP of Engineering at Mavenlink but also a bug hunter in his free time, has discovered that Google Apps Scripts can be misused by attackers to access …

Freenode suffers breach, asks users to change their passwords

Popular IRC network Freenode has suffered a security breach and is asking users to change their passwords, as they might have been compromised. “Earlier today the …

Bulletproof SSL and TLS
Bulletproof SSL and TLS

Deploying SSL or TLS in a secure way is a great challenge for system administrators. This book aims to simplify that challenge by offering extensive knowledge and good advice …

Home Depot and Target attackers likely not the same

More details about the malware used in the Home Depot breach have surfaced, and it seems that, after all, it wasn’t the one used in the Target breach (BlackPOS). …

Yahoo’s fight against US govt secret surveillance revealed

Unsealed documents from Yahoo’s challenge to the expansion of US surveillance laws in 2007 and 2008 have shown how the company was ultimately made to comply to the US …

Researchers find malicious extensions in Chrome Web Store

Earlier this year, Google has made it so that extension that are not hosted on the Chrome Web Store can’t be installed and used by users of its popular browser. This …

Researchers unlock TorrentLocker encryption

A team of Finnish researchers has discovered that the files encrypted by the recently unearthed TorrentLocker ransomware can be decrypted without paying the ransom – if …

Massive Gmail credential leak is not result of a breach

By now, you might have heard that there has been a leak of a nearly 5 million username and password combinations associated with Google accounts. According to an RT report, …

Microsoft refuses to hand over emails stored in Ireland, held in contempt by judge

Microsoft has urged US District Judge Loretta Preska, the judge presiding over the case that sees the company refusing to hand some emails stored in its Dublin facility over …

Phishers resort to AES crypto to obfuscate phishing sites

Phishers have started employing AES encryption to disguise the real nature of phishing sites from automatic phishing detection tools. This is the latest obfuscating trick in …

DARPA is after vulnerabilities in algorithms implemented in software

The Defense Advanced Research Projects Agency (DARPA) is looking for new program analysis techniques and tools to enable analysts to identify vulnerabilities in algorithms …

Home Depot breach confirmed, stolen info used to change PINs, collect money

In a terse statement, and an annoyingly repetitive FAQ, Home Depot has confirmed that it had suffered a breach of its payment data systems. The breach could impact any …

Don't miss

Cybersecurity news