Help Net Security newsletters: Latest news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
Geodo infostealer gets help from worm

The distribution potential of the infamous Cridex infostealer (also known as Feodo or Bugat) just went up a notch, as a new version of the malware works in conjunction with a …

Worldwide IT spending to grow 2.1 percent in 2014

Worldwide IT spending is on pace to total $3.7 trillion in 2014, a 2.1 percent increase from last year, however, this grow rate is down from earlier projections of 3.2 percent …

Western energy companies hit by state-sponsored hackers

Symantec researchers have confirmed the findings of their colleagues at F-Secure, who have been monitoring the spreading of the Havex malware family, and have put them in a …

Microsoft disrupts malware networks and APT operations

Microsoft’s Digital Crimes Unit struck again, and was allowed to seize 23 free domain names in an effort to strike a fatal blow to malware delivery networks run by a …

163k individuals affected in Butler Uni data breach

Personal and financial information of some 163,000 students, alumni, faculty, staff, and past applicants of Indianapolis-based Butler University have been stolen following a …

Google Drive update fixes data-leaking flaw

Google has fixed a security issue that made some of the files stored on Google Drive and shared with friends or colleagues via a direct link potentially reachable by …

Banking malware sniffs out data sent over HTTPS

Careful online banking users can sometimes spot that something is amiss when malware installed on their computer pops up phishing pages or adds fields to legitimate banking …

How does a rogue ad network function?

It’s a well known fact that a considerable chunk of Internet traffic is bogus, made by infected computers that visit sites and click on adverts chosen by malicious …

Germany cancels Verizon’s government contract due to spying fears

Verizon will no longer provide internet services to a number of German government departments, as their contract has been cancelled as part of a restructuration of the federal …

PayPal 2FA flow partially mitigated, accounts are safe

In the wake of the revelation of a flaw that allows attackers to bypass PayPal’s two-factor authentication feature, the e-payment giant has made it temporarily …

A look at Interflow, Microsoft’s threat information exchange platform

In the last few years, there has been one constant call from almost all participants in the information security community: the call for cooperation. But that is easier said …

Critical Android code-execution flaw affects all but the latest version

IBM researchers have discovered a critical security vulnerability in Android 4.3 (Jelly Bean) and below which could allow attackers to exfiltrate sensitive information – …

Don't miss

Cybersecurity news