Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
USB
Enterprise USB security is outdated and inadequate

While USB drives are ubiquitous for employees across all industries, security policies for these devices are often severely outdated or grossly inadequate for protecting …

face
1.4 billion unencrypted credentials found in interactive database on the dark web

A data dump containing over 1.4 billion email addresses and clear text credentials  is offered for download in an underground community forum. What’s so special about …

mobile code
An analysis of 120 mobile app stores uncovers plethora of malicious apps

RiskIQ analyzed 120 mobile app stores and more than 2 billion daily scanned resources. In listing and analyzing the app stores hosting the most malicious mobile apps and the …

biohazard
Return of Necurs botnet brings new ransomware threat

The Necurs botnet has returned to the top ten most prevalent malware during November 2017, as cybercriminals used it to distribute a new form of ransomware, according to Check …

Hands
MoneyTaker’s stealthy hacking spree spread from US to Russia

A stealthy group of Russian-speaking hackers has been targeting financial organizations (banks, credit unions, lenders) in the US and Russia, stealing money and documentation …

HP laptops
Keylogger found in Synaptics driver on HP laptops

For the second time this year, a security researcher unearthed a keylogger in a driver used on a number of HP laptops. The first time was earlier this year, when Swiss …

servers
Worldwide server revenue grew 16% in Q3 2017

In the third quarter of 2017, worldwide server revenue increased 16 percent year over year, while shipments grew 5.1 percent from the second quarter of 2016, according to …

Android
Android vulnerability allows attackers to modify apps without affecting their signatures

Among the many Android vulnerabilities patched by Google this December is one that allows attackers to modify apps without affecting their signatures. The danger …

abstract, generic
Week in review: Ransomware’s next stop, NiceHash hack, and why phishers love HTTPS

Here’s an overview of some of last week’s most interesting news and articles: Bitcoin traders beware: Fake trading bot offer delivers RAT The malicious offer comes …

Bitcoin
Bitcoin traders beware: Fake trading bot offer delivers RAT

As the price of Bitcoin keeps hitting surprising heights, more and more cyber crooks are turning their sights on anything and anyone who trades or uses the popular …

Google Chrome
Chrome site isolation option offers more security

Chrome 63, which was promoted to the stable release channel on Wednesday, comes with many security fixes and improvements, especially for the enterprise audience. Site …

Apple iMac
Apple users, it’s time for new security updates

Apple usually pushes out security updates for its various devices and software on the same day, but not this time. The iOS update was rushed out on Saturday because of a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools