Help Net Security newsletters: Latest news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
Google Play
Infosec expert viewpoint: Google Play malware

Researchers routinely discover a variety of malicious apps on Google Play, some of which have been downloaded and installed on millions of devices worldwide. Here’s what …

identity
Insights from 700M thwarted cyberattacks show how the fight against cybercrime has intensified

2017 was a record-setting year in the fight against cybercrime. Based on analysis of real world cybercrime attacks, ThreatMetrix confirmed a 100 percent increase in volume of …

skull
The rise of ransom hacks, and the potential impact on your business

The percentage of companies reporting financially motivated cyber attacks has doubled over the past two years, with 50% of companies experiencing a cyber attack motivated by …

IoT
Internet of Things security issues bleed into 2018

In 2017 Internet of Things (IoT) devices rose to prominence as attackers have continued to target and use them to support various cyberattacks. IoT devices are almost the …

Monero
RIG EK covertly delivers cryptocurrency miners

Malware peddlers have been quick to react to the cryptocurrency boom and to take advantage of every possible way to make other people and organizations mine coins for them. …

law enforcement
What the rise of cyber indictments means for 2018

The growing implementation of indictments throughout 2017 was arguably the most impactful government action to counter cyber attacks, and yet received little attention. In …

Ledger Nano S
Hardware wallet security is no match for scammers’ ingenuity

It is often noted that hardware cryptocurrency wallets are one of the better options for keeping one’s private keys safe: they are not affected by malware, the private …

healthcare ransomware
Healthcare breaches involving ransomware increase year-over-year

2017 has been a very challenging year for healthcare institutions as these organizations remain under sustained attack by cybercriminals that continue to target their …

Skull
Why ransomware? Let’s ask the bad guys

I am involved with ransomware because it is ‘fast, easy, and safe”. This was the feedback we got when we asked the bad guys about the motivations for being involved with this …

fire
Exploits and fileless malware drive record new malware surge

McAfee released its McAfee Labs Threat Report: December 2017, examining the growth and trends of new malware, ransomware, and other threats in Q3 2017. McAfee Labs saw malware …

face
1.4 billion unencrypted credentials found in interactive database on the dark web

A data dump containing over 1.4 billion email addresses and clear text credentials  is offered for download in an underground community forum. What’s so special about …

mobile code
An analysis of 120 mobile app stores uncovers plethora of malicious apps

RiskIQ analyzed 120 mobile app stores and more than 2 billion daily scanned resources. In listing and analyzing the app stores hosting the most malicious mobile apps and the …

Don't miss

Cybersecurity news