Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

In a recently released whitepaper, Trend Micro researchers have shared many details about a long-standing economic and political cyber-espionage operation they dubbed Pawn …

Cyber skills shortage makes UK a soft target for hackers

A survey conducted by MWR InfoSecurity at 44Con 2014 has revealed that 75% of the information security professionals in attendance believed that a lack of cyber security …

Attackers bypass Sandworm patch with new 0-day

The Sandworm vulnerability has been patched, but unfortunately attackers have discovered a way to bypass the patch and continue with their targeted attacks. “As with …

Two exploit kits prey on Flash Player flaw patched only last week

Two exploit kits have been outfitted with the exploit for a Flash Player vulnerability that has been patched only a week ago, the researcher that goes by the handle Kafeine …

Apple warns about organized network attacks against iCloud users

In the wake of the claims that the Chinese authorities have mounted a MITM attack against iCloud and Microsoft account holders by redirecting them to spoofed login pages, …

Avast 2015 identifies vulnerable home routers

Avast Software launched Avast 2015, available in four consumer variations: Avast Free Antivirus, Avast Pro Antivirus, Avast Internet Security, and Avast Premier. All versions …

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Microsoft is warning users about a new Windows zero-day vulnerability that is being actively exploited in the wild and is primarily a risk to users on servers and workstations …

Attackers change home routers’ DNS settings via malicious code injected in ads

Sucuri Security researchers have unearthed a malvertising campaign aimed at changing the DNS settings of home routers in order to lead users questionable and potentially …

Koler worm spreads via SMS, holds phones for ransom

A new variant of the Android malware Koler now spreads by text message and holds infected users’ phones hostage until a ransom is paid. AdaptiveMobile detected the …

60% of Android attacks use financial malware

Malicious programs targeting Android-based devices in order to steal money were used in 60 percent of attempted attacks registered by Kaspersky Lab security products, …

Malware directs stolen documents to Google Drive

Researchers have uncovered a new type of information-stealing malware that is apparently used in campaigns targeting government agencies and can syphon files from compromised …

2FA: Google offers physical alternative to verification codes

Google is offering an alternative second factor for its two-step account verification option, one that has the additional advantage of thwarting phishing attacks. It’s …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools