![Trojan](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09100949/trojan_horse-400x200.jpg)
BackSwap Trojan exploits standard browser features to empty bank accounts
Creating effective and stealthy banking malware is becoming increasingly difficult, forcing malware authors to come up with innovative methods. The latest creative burst in …
![Facebook 2FA](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09100953/facebook-2fa-400x200.png)
Facebook now supports 2FA via authenticator apps
Facebook has good news for users who wish to secure their accounts with two-factor authentication but aren’t comfortable sharing their phone number with the social …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105446/risk-400x200.jpg)
Quantifying cyber exposure: Attackers are racing ahead
Cybercriminals have a median seven-day window of opportunity during which they can exploit a vulnerability to attack their victims, potentially siphoning sensitive data, …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104044/abstract-400x200.jpeg)
CIOs are forced to compromise between faster innovation and perfectly working software
An independent global survey of 800 CIOs revealed that 73% of organizations say the need for speed in digital innovation is putting customer experience at risk. The study …
![abstract, generic](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110119/abstract5-400x200.jpg)
Week in review: VPNFilter, hacking BMW cars, verifying data processing for privacy and GDPR
Here’s an overview of some of last week’s most interesting news and articles: The percentage of open source code in proprietary apps is rising The number of open …
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104830/microsoft-400x200.jpg)
Microsoft will extend GDPR rights to customers worldwide
Microsoft has announced it will extend the rights that are at the heart of GDPR to all of their consumer customers worldwide. “Known as Data Subject Rights, they include …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101001/apple-400x200.jpg)
European users can request a copy of the data Apple keeps on them
Apple has set up a Data and Privacy portal where users can make a request to download all the data Apple has on them, correct their personal information, deactivate or delete …
![Exponential‐e](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101005/exponentiale-400x200.jpg)
New infosec products of the week: May 25, 2018
Prioritizing open source security alerts WhiteSource launched its next-generation Software Composition Analysis solutions – Effective Usage Analysis. The technology …
![Bitcoin](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101011/bitcoin-400x200.jpeg)
How security pros see the future of cryptocurrencies and cryptomining
Data gathered by Lastline at RSA Conference 2018 reveals security professionals’ perspectives on the future of cryptocurrencies and cryptomining, response to ransomware …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
Fraud data shows 680% spike in fraudulent mobile app transactions
The number of fraudulent transactions originating from a mobile app during the first quarter has increased by 200 per cent since 2015, according to RSA Security. Analysis from …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101017/healthcare-1-400x200.jpg)
1 in 10 healthcare organizations paid a ransom within the last year
More than one in three healthcare organizations have suffered a cyberattack within the last year, while almost one in 10 have paid a ransom or extortion fee, according to …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
VPNFilter malware compromises over 500,000 networking devices around the world
Cisco Talos researchers have flagged a huge botnet of small and home office routers and NAS devices, capable of collecting communications and data and launching cyber attacks. …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)