Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
What inspired you to start hacking?

This is a question that Jennifer Steffens, IOActive CEO, often asks hackers she meets on conferences around the world. More often than not, the answer is movies: War Games, …

Hacking for the greater good

As long as people write code, they will write code with flaws, says Katie Moussouris, former Senior Security Strategist Lead at Microsoft Security Response Center and, as of …

Outlook for Android fails to keep emails confidential

Did you know that Outlook and many other email and mobile messaging Android apps store your emails and messages on the device’s SD card, unencrypted, and accessible to …

Apps on your Android phone can take photos without you knowing

A researcher has demonstrated that it’s possible for malicious attackers to create an Android app that will surreptitiously take pictures and upload them to a remote …

Hybrid Zberp Trojan targets bank users around the world

A new threat created by the amalgamation of the publicly available code of two of the most (in)famous malware around is targeting users of over 450 financial institutions …

Hacker hijacks Apple devices remotely, asks for ransom

An unusual case of cyber extortion has been spotted in Australia: Apple device users in Queensland, NSW, Western Australia, South Australia and Victoria have woken up to see …

In wake of breach, eBay has to deal with multiple web vulnerabilities

As eBay flounders while trying to adequately respond to the breach it disclosed last week, and deems weak passwords to be good but stronger ones to be weak, researchers are …

China will start screening IT products

The Chinese government has announced that it will start vetting IT products and services that are to be used on networks and systems important to national security and public …

Anti-surveillance mask foils facial recognition systems

The unnerving ubiquity of security cameras in public places and the fact that an increasing number of them are connected to facial recognition systems has spurred …

Google Image Search results redirect to Browlock ransomware

Browlock is the most basic approach to ransomware there is: there is no actual malware that blocks the victims’ computer or encrypts its contents, there is only a Web …

Facebook introduces privacy check up tool

Facebook continues on its course to give users more privacy by making “Friends” the default sharing option for first time posters, and by introducing a privacy …

CERN, MIT scientists launch Swiss-based secure webmail

Last week marked the beta release of yet another encrypted, secure email service, and interest for it was so overwhelming that its developers had to temporarily close the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools