Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
VirusTotal sets up huge AV whitelist to minimize false positives

One of the worst things that can happen to a software developer, and especially if they are a small firm or a single individual, is for their program to be falsely detected as …

Attackers can bypass Windows’ protections by changing a single bit

Among the many vulnerabilities that Microsoft patched on Tuesday is one that can be exploited to bypass all Windows security measures by, curiously enough, modifying a single …

Increase in enterprise cloud adoption and data risk

Skyhigh Networks analyzed actual cloud usage data from over 15 million enterprise employees across 350 enterprises. Although they found a record high percentage of cloud …

Improved Simplocker variant hits Android users hard

Mobile crypto-ransomware Simplocker has evolved, and returning the encrypted files to their unencrypted state is no longer easy as it was. First spotted in June 2014, …

A closer look at LepideAuditor Suite

Server systems are the pillars of an organization’s working environment, and they should be up and running at all times, without any interruptions. If a server crashes …

Active spam campaign leads to sophisticated PayPal phishing sites

PayPal-themed phishing campaigns are nothing new, but they are more and more legitimate-looking as time goes by. Researchers with OpenDNS Labs have spotted one such campaign …

Facebook unveils platform for exchanging security threat information

Facebook and sever other big Internet and tech companies have banded together to create ThreatExchange, a platform for exchanging security threat information. …

Google Play flaw opens Android devices to silent malware installation

Android users are in danger of getting malicious apps silently installed on their devices by attackers, warns Rapid7’s Tod Beardsley, technical lead for the Metasploit …

Jeb Bush dumps emails full of private data online

Jeb Bush, who might end up being a candidate in the next 2016 US presidential election, has made a clumsy misstep in his attempt to provide “transparency” into his …

Tens of thousands MongoDB databases easily accessible from the Internet

A group of students from Saarland University’s Center for IT-Security, Privacy and Accountability (CISPA) have discovered tens of thousands MongoDB databases accessible …

Dangerous vulnerabilities plague IoT home security systems

Owners of Internet-connected home security systems may not be the only ones monitoring their homes. A new HP study found that 100 percent of the studied devices used in home …

Forbes.com compromised by Chinese cyber spies targeting US firms

Forbes.com – the 61st most popular website in the US according to Alexa – has been compromised to redirect certain visitors to websites delivering espionage …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools