![Android graffiti](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110209/android-graffiti-400x200.jpg)
132 compromised apps removed from Google Play
Google has recently removed 132 Android apps from Google Play due to them containing in their local HTML pages hidden iFrames linking to malicious domains. But even though …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104938/biohazard-400x200.jpg)
Ransomware spiked 752% in new families
2016 was truly the year of online extortion. Cyber threats reached an all-time high, with ransomware and Business Email Compromise (BEC) scams gaining increased popularity …
![macOS ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105011/macOSransomware-400x200.jpg)
Victims of Filecoder ransomware for macOS can now decrypt their files
Last week, researchers discovered and analyzed a new piece of ransomware targeting a specific subset of Mac users: those who are looking for ways to crack legal copies of some …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105945/android-400x200.jpg)
Germans, Czechs served with banking malware through SMS
German and Czech Android users are getting served with a banking Trojan directly through text messages, warns malware researcher Bart Blaze. The message claims that the user …
![Cybereason platform](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105050/cybereason-platform-400x200.jpg)
Rewriting the rules on how to protect against evolving adversaries
Hackers are getting better at exploiting your organization’s increasingly complex IT environment. Adversaries are using highly customized attack campaigns to infiltrate …
![Deutsche Telekom](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105718/deutsche-telekom-400x200.jpg)
Suspected Deutsche Telekom router hacker arrested
A 29-year-old British national, believed to be the mastermind behind last November’s unsuccessful hijacking attempt of Deutsche Telekom users’ routers, was …
![Passages](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105009/Passages-400x200.jpg)
Passages: Secure virtual browser for malware isolation
Over 90% of undetected attacks come through the web. In this podcast recorded at RSA Conference 2017, Lance Cottrell, Chief Scientist at Ntrepid, talks about Passages, a …
![macOS ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105011/macOSransomware-400x200.jpg)
New macOS ransomware masquerades as software cracking tools
New crypto ransomware dubbed Filecoder (aka Findzip) is stalking macOS users, ESET researchers warn. Masquerading as an application for cracking/patching legal copies of Adobe …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105016/danger-400x200.jpg)
Advanced Windows botnet spreads Mirai malware
Kaspersky Lab experts are analyzing the first Windows-based spreader for the Mirai malware as part of a concerted effort to close down Mirai botnets in the wild. The Windows …
![shadow](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194957/shadow-400x200.jpg)
Ransomware attacks growing rapidly, organizations are struggling
The percentage of ransomware attacks increased from 5.5%, to 10.5% of all recognized malware attacks from July to December 2016, according to Check Point. Check Point …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110009/industry-400x200.jpg)
Detecting PLC malware in industrial control systems
How can attackers load programmable logic controllers (PLC) with destructive malware, and how can the operators of industrial control systems (ICS) detect it? According to a …
![Eye](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110527/eye-400x200.jpg)
How IDF soldiers’ phones got turned into spying devices
For many months now, an unknown threat actor has been tricking servicemen in the Israel Defense Forces (IDF) into installing Android spyware. Israeli media says that the …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?