Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Orgs choose network performance over security

An alarming number of organizations are disabling advanced firewall features in order to avoid significant network performance degradation, say the results of the Network …

Fake “Online Ebola Alert Tool” delivers Trojan, unwanted apps

Cyber scammers continue to take advantage of the fear and apprehension surrounding the proliferation of the Ebola virus. While Ebola-themed online hoaxes are nothing new, …

Over one-third of all enterprise data leakage policy violations occur on mobile devices

Nearly half of all cloud app activities and more than one-third of all data leakage policy violations occur on mobile devices, say the results of the October 2014 Netskope …

Samsung users could be locked out of their devices by attackers

A zero-day flaw in Samsung’s Find My Mobile system that can be extremely easily exploited to remotely lock a target’s phone has been uncovered by programmer and …

US ICS operators under attack by crims wielding BlackEnergy malware

The US ICS-CERT has issued a warning about an ongoing sophisticated malware campaign that has hit a number of industrial control systems (ICSs) environments using a variant of …

10% of employees unaware if they have an IT department or not

A transatlantic survey of 2000 employees has found that only a fifth of UK workers think their data is more secure at work than at than at home, whereas the majority of US …

IT is losing the battle on security in the cloud

A majority of IT organizations are kept in the dark when it comes to protecting corporate data in the cloud, putting confidential and sensitive information at risk. This is …

Russian-based cyber spies going after military, intelligence targets

FireEye today released a comprehensive intelligence report that assesses that an advanced persistent threat (APT) group may be sponsored by the Russian government. The report …

ScanBox keylogging framework lurking on disparate watering holes

Watering hole attacks are usually associated with cyber espionage efforts and are booby-trapped with exploit kits that deliver malware onto the visitors’ vulnerable …

Belgacom shares more details about alleged GCHQ breach

Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has allegedly mounted a successful attack against primarily state-owned …

Crooks use stolen magnetic payment card info to make fraudulent chip-enabled transactions

The chip and PIN payment card system – or EMV – is considered to be more secure than the magnetic strip one, but it’s also not bulletproof. Nevertheless, US …

246 percent spike in Apple-themed phishing scams

Phishing scams targeting Apple users saw a dramatic upswing in Q3 of this year. Compared to Q1 2014, Apple users faced a 246% increase in the attacks that masquerade as a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools