![Cisco WebEx](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105257/cisco_webex-400x200.jpg)
Cisco WebEx extension opens Chrome users to drive-by malware attacks
Windows users who have the widely used Cisco WebEx extension installed on Chrome are in danger of getting silently hacked when visiting a malicious website. The vulnerability, …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113423/world-400x200.jpg)
Family dynamics in a connected world
A new global study by Intel Security aims to better comprehend how families’ attitudes and habits are evolving as their homes and lifestyles become increasingly connected. …
![eye dark](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105300/eye-dark-400x200.jpg)
How money-hungry data brokers erode privacy in China
A recent expose by Southern Metropolis Daily, a Chinese daily newspaper known for its investigative reporting, has revealed that random people with enough money at their …
![Android malware](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105304/android-malware-400x200.jpg)
Researchers predict upsurge of Android banking malware
Android users, beware: source code and instructions for creating a potent Android banking Trojan have been leaked on a hacker forum, and researchers are expecting an onslaught …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105306/usa-400x200.jpg)
54% of Americans say existing cyber security laws aren’t getting the job done
As President Trump and the new Congress stake out a 2017 agenda, Americans want to see a pressing need to modernize laws dealing with the digital economy and stepped up …
![](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105308/lavabit-400x200.jpg)
Encrypted webmail service Lavabit relaunched
Lavabit, the secure encrypted webmail service used by Edward Snowden, is back online. Lavabit founder and operator Ladar Levison shut it down in 2013 when the US government …
![people](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105314/people-400x200.jpg)
Infosec certification and the talent shortage crisis
As more enterprises aspire to create future workspaces and harness the benefits of a mobile workforce that leverages cloud platforms, there’s a greater need to implement …
![Lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113522/lock-eye-400x200.png)
Global data privacy laws: The #1 cross-border e-discovery challenge
In the year since the EU’s rejection of Safe Harbor, there has been a spike in legal concern over cross-border data transfers, according to a survey by BDO Consulting. Sixty …
![abstract, generic](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110119/abstract5-400x200.jpg)
Week in review: Kali Linux certification, cross-browser fingerprinting, most common passwords of 2016
Here’s an overview of some of last week’s most interesting news and articles: Fruitfly: Unusual Mac backdoor used for tightly targeted attacks? The malware – …
![Meitu](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105318/meitu-400x200.jpg)
Meitu photo retouching app may be invading your privacy
Have you heard about Meitu, the photo retouching mobile app that turns people into more cutesy or beautiful versions of themselves? Chances are that even if you don’t …
![Western Union](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105321/westernunion-400x200.jpg)
Western Union admits it facilitated scammers, forfeits $586 million
Western Union has agreed to forfeit $586 million and enter into agreements with the Federal Trade Commission, the Justice Department, and several U.S. Attorneys’ Offices. …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Satan: A new Ransomware as a Service
If you’ve been hit by ransomware that has scrambled the names of your encrypted files and has appended the .stn extension to them, you’ve been targeted by Satan …
Featured news
Sponsored
Don't miss
- Ransomware gang targets IT workers with new RAT masquerading as IP scanner
- Researchers unearth MotW bypass technique used by threat actors for years
- ITSM concerns when integrating new AI services
- Scaling data security solutions: What you need to know
- Whitepaper: Tools to tackle the multicloud environment