![Library](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195203/library-400x200.jpg)
Sensitive child profiles, private messages exposed online
Security researcher Chris Vickery has discovered another database containing sensitive user data exposed online (i.e. accessible via Internet). Leveraging Shodan, he unearthed …
German police allowed to use its own “federal Trojan”
The German Interior Ministry has approved for investigative use a spying Trojan developed by the German Federal Criminal Police (a so-called “federal Trojan”). In …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194237/code-400x200.jpg)
Source code of “game changer” Android banking malware leaked online
If you ask users and malware analysts, the Android threat landscape is wide enough, but unfortunately it’s likely to get even wider as source code for the GM Bot banking …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194536/android-400x200.jpg)
Mobile banking Trojan bypasses Google Play security
The Acecard malware is capable of attacking users of nearly 50 different online financial applications and services and is able to bypass Google Play store security measures, …
![world in hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194240/world-hand-400x200.jpg)
Perceptions and buying practices of infosec decision makers
CyberEdge Group surveyed 1,000 IT infosec decision makers and practitioners from 10 countries, five continents, and 19 industries, and unsurprisingly, the news is not good. In …
![AT&T IoT report](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194243/att-iot-report-400x200.jpg)
Most businesses are considering or implementing IoT
The Internet of Things (IoT) is growing at an exponential rate. By 2020, some 50 billion devices will connect to the Internet and the economic value created by IoT could be …
![ecommerce](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194246/e-commerce-400x200.jpg)
Ecommerce fraud surges 163%
The worst fears of online retailers has been confirmed with data just released today: in 2015, the number of attacks by fraudsters was up 163 percent – growing two and a half …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195011/apple-400x200.jpg)
Apple to US govt: Withdraw demand for iPhone unlocking, we all need to talk first
The battle between Apple and the US Justice Department continues, as the company still refuses to help the feds access the contents of a PIN-locked iPhone used by gunman Syed …
![ZergHelper](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194250/ZergHelper-interfaces-400x200.jpg)
Pirated App Store client for iOS found on Apple’s App Store
An app called 开心日常英语 (“Happy Daily English”), which has been offered for download via Apple’s official App Store, has been revealed to be a fully functional …
![Linux Mint](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194253/linux-mint-400x200.jpg)
Linux Mint hack: Backdoored ISOs, stolen forums database
The web properties of the project developing Linux Mint have been compromised, and the attacker managed to put up a backdoored version of the distro for download for a little …
![Volvo](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194255/volvo-keyless-400x200.jpg)
Volvo to launch a car without a physical key
Can you imagine accessing and driving your car without a physical key? In a first for the automotive industry, Volvo is set to become the first car manufacturer to offer cars …
![Flashpoint dark web](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194258/flashpoint-darkweb-400x200.jpg)
Deep and Dark Web: Complexity and escalating cybercriminal activity
Flashpoint released an annual research report that looks to uncover the growing complexity of illicit communities and the industrialization of cybercrime over the past year. …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark