![Alibaba.com](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195741/twitter-alibaba1-400x200.jpg)
Fake “account verification” email targeting Alibaba.com users
Businesses who use Alibaba.com to connect with Chinese manufacturers are being targeted in a recently discovered phishing campaign, Comodo warns. It takes the form of phishing …
![Trojan](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09100949/trojan_horse-400x200.jpg)
Operation targets users of remote access trojans across Europe
In December, Europol and a number of law enforcement and judicial authorities across Europe carried out a two weeks long coordinated action against the use of remote access …
![Keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195758/laptop-820274_1280-400x200.jpg)
Vuvuzela: An untraceable messaging system aimed at thwarting powerful adversaries
A group of scientists from the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) believe they have created an effective and scalable text-messaging system …
![Twitter](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195800/twitter_wallpaper_039-400x200.jpg)
Twitter users warned about being targeted by state-sponsored attacks
Twitter has sent out unexpected warning notices to a number of users, informing them that their account might have been targeted by state-sponsored hackers. “We believe …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195808/Fotolia_87149221_S-400x200.jpg)
Are your competitors organizing DDoS attacks against you?
According to recent research from Kaspersky Lab and B2B International, nearly half (48 per cent) of the companies surveyed believe they know the identity and motivation of …
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195815/dollar-943737_1280-400x200.jpg)
Cybercriminals increasingly hunting down the money
The tools used by cyber-criminals against businesses in 2015 were different to those used against consumers, according to Kaspersky Lab’s review of corporate threats in …
Week in review: First ever EU rules on cybersecurity, insider threats, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: New Steam escrow system drives impatient users to fake trading sites serving malware …
![Steam](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195359/steam_logo-400x200.jpg)
New Steam escrow system drives impatient users to fake trading sites serving malware
On Wednesday, Valve introduced a new “trade hold” system that should prevent scammers from stealing items from Steam users’ hijacked account, or at least …
Business email compromise scams still happening, still successful
Despite repeated warnings issued by law enforcement, information sharing organizations, and security companies, Business Email Compromise (BEC) scams still abound and the …
WP Engine breached, forces users to change their passwords
Popular WordPress-specific hosting provider WP Engine has apparently suffered a data breach, and is forcing their customers to change their passwords.“We are writing …
SQL injection has surfaced as the no. 1 attack in 2015
A new survey from Ponemon Institute finds that nearly 80 percent of enterprises say that their organization’s portfolio of applications has become more vulnerable to …
![Pirate flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195357/pirate-flag-400x200.jpg)
Malware threats on pirated content sites
Content theft sites pose a serious and growing threat to Internet users by exposing them to harmful malware that can lead to identity theft, financial loss and computers being …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days