Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Shortened .gov URLs lead to scams

The fact that cyber crooks often misuse URL shortening services in order to trick users into following dangerous links is not news, but Symantec researchers have lately …

French hacker arrested for creating, spreading SMS Trojan

A 20-year-old from Amiens, France, has allegedly managed to steal around half a million of euros (over $650,000) by creating and distributing a Trojan disguised as legitimate …

Newest Apple Java update kills the Java browser plug-in

Determined not to fall behind on its Java updates, Apple has issued the latest one on Tuesday, the very same day that Oracle pushed out its own. But the big news isn’t …

Multi-platform attack site discovered via fake Lookout Android app

Researchers from security firm TrustGo have recently spotted on Google Play a bogus app that supposedly automatizes the updating of a batch of other apps. What piqued their …

Fake KLM e-tickets lead to malware

If you have recently booked a flight with KLM, please be careful when reviewing emails that appear to have been sent from the airline carrier, as rather legitimate-looking …

eBay phishers quickly react to branding change

eBay has recently redesigned its logo, and it didn’t take long for some phishers to modify their attempts to match the change: “It probably won’t be long …

Ransomware adds audio component to force users to pay up

Not satisfied with just showing the fake FBI note, the criminals behind one of the many ransomware campaigns going on at the moment are trying to assault the users’ …

Massive WoW killing spree due to in-game exploit

What should have been a relaxing and afternoon in the virtual world of Azeroth turned to a veritable bloodbath as unknown hackers used a still unknown exploit to kill off …

Proxy service users download malware, unknowingly join botnet

In yet another example of if-it’s-too-good-to-be-true-it-probably-isn’t, hundreds of thousands of users signing up for a cheap and supposedly legitimate proxy …

Malware Forensics Field Guide for Windows Systems

If you are looking for a field guide that will help you identify malware on a Windows computer system, examine it, and determine its impact, than this book might be just the …

The danger behind low-volume email attacks

“Broad campaigns often spoof notifications from well-known businesses, establishments, organizations, and agencies, and are very widespread these days. However, smaller …

Info-stealing Trojan posing as Panda Cloud Antivirus

Researchers from Spanish antivirus vendor Panda Security are warning potential users about information-stealing malware disguised as their Panda Cloud Antivirus solution. The …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools