Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Six threats to watch out for in 2013

FortiGuard Labs revealed its 2013 threat predictions, highlighting six threats to watch out for next year. 1. APTs Target Individuals through mobile platforms APTs also known …

Gameover gang uses Cutwail botnet to swell its own

The hackers behind the Gameover variant of the popular Zeus banking Trojan have rented the massive Cutwail botnet in order to send out millions of fake emails carrying the …

Battles over online information control to escalate

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous …

Microsoft concludes Russian programmer didn’t operate Kelihos botnet

Following the settling of the Nitol botnet lawsuit earlier this month, Microsoft has announced on Friday that it has reached a settlement with Russian software programmer …

miniFlame discovered, designed for targeted cyber espionage

Kaspersky Lab announced the discovery of miniFlame, a small and highly flexible malicious program designed to steal data and control infected systems during targeted cyber …

Proxy service users download malware, unknowingly join botnet

In yet another example of if-it’s-too-good-to-be-true-it-probably-isn’t, hundreds of thousands of users signing up for a cheap and supposedly legitimate proxy …

Microsoft settles Nitol botnet lawsuit

Less than a month since Microsoft’s revelation that it had disrupted the functioning of the Nitol botnet by effecting a takedown of a domain (3322.org) which was also …

How to prevent a botnet infection?

The research team at e-mail security provider Eleven, published five tips today to help users prevent a botnet infection on their computer. Botnets are groups of hijacked …

Lucrative ZeroAccess botnet enslaves one million active computers

The ZeroAccess rootkit has been around for quite some time now, spying on infected users, hiding from installed AV solutions and attempting to terminate them, redirecting …

Twitter messages lead to phishing AND malware

If you have received a private message from another Twitter telling you “lol ur famous now”, have followed it to a fake Facebook page requiring you to log into …

Microsoft’s study into unsecure supply chains leads to botnet disruption

Microsoft’s Digital Crimes Unit has disrupted the functioning of yet another botnet by effecting a takedown of a domain which was also hosting over 500 different strains …

Botnet operators hide C&Cs in the Tor network

Over the years, botnet owners have tried out different tactics for keeping their C&C servers online, in contact with the zombie computers, and hidden from researchers and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools