Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
SIM encryption flaw opens 500M users to attack

A flaw in the encryption technology used by some SIM cards can allow attackers to make the target phone download malicious apps and even effectively clone a user’s card …

Syrian hackers hit Tango, The Daily Dot

Pro-Assad hacker group the Syrian Electronic Army claims to have breached the back-up database of Tango, the company behind the popular eponymous app, and to have exfiltrated …

HTML ransomware goes global

Last week we saw that a ransomware scheme does not need to involve actual malware, as clever cyber crooks leveraged browsers’ “restore from crash” feature to …

Cisco to acquire Sourcefire for $2.7 billion

Cisco will acquire Sourcefire, a provider of cybersecurity solutions. The acquisition adds a team with deep security DNA to Cisco and will accelerate delivery of Cisco’s …

U.S. the number one source of web attacks

Retailers suffer twice as many SQL injection attacks as other industries, according to Imperva. Additionally, these attacks were more intense, both in terms of number of …

Ubuntu Forums hacker won’t publish stolen passwords

The Ubuntu Forums are still down following this weekend’s breach claimed by a hacker that goes by the online handle “Sputn1k_”, and there is no news on when …

Quarri delivers Protect On Q as a virtual appliance

Quarri Technologies released Quarri Protect On Q (POQ) 3.2, a virtual appliance version of its flagship web browser security solution. It also delivers high availability, …

Combat Arms players, beware of free NX generators

Players of the popular Combat Arms first-person shooter are being targeted by online crooks via the in-game chat system, warns Chris Boyd. They crooks offer what is supposedly …

Deliver real-time phishing detection from Webroot and RSA

Webroot announced a technology partnership with RSA, The Security Division of EMC, to provide real-time phishing detection to RSA FraudActionSM Anti-Phishing Service. Phishing …

Study connects cybercrime to job loss

After years of guesswork and innumerable attempts to quantify the costly effects of cybercrime on the U.S. and world economies, McAfee engaged the Center for Strategic and …

Children as adversaries in technologically-enhanced homes

You might sometimes consider your child an adversary when he or she prevents you from sleeping enough hours or having a sit-down meal without interruptions, but Microsoft …

Multiple Java versions on endpoints risky for enterprises

Java represents a significant security risk to enterprises because it is the endpoint technology most targeted by cyber attacks, show the results of Bit9 research. The …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools