Ebola-themed emails deliver malware, exploit Sandworm vulnerability

Posted on 24 October 2014.  |  One of the most prolific campaigns is the one that impersonates the World Health Organization.

Attackers bypass Sandworm patch with new 0-day

Posted on 23 October 2014.  |  Attackers have discovered a way to bypass the patch and continue with their targeted attacks.

Koler worm spreads via SMS, holds phones for ransom

Posted on 22 October 2014.  |  A new variant of the Android malware Koler now spreads by text message and holds infected users’ phones hostage until a ransom is paid.

OS X Yosemite's Spotlight Suggestions: Privacy killer or not?

Posted on 21 October 2014.  |  Spotlight can now also be used to make searches on the Internet, and it sends the users' search queries and information about their physical location to Apple.

China executes MITM attack against iCloud and Microsoft account holders

Posted on 20 October 2014.  |  China-based Internet users are in danger of getting their iCloud and Windows Live accounts hijacked.

Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
Events
McAfee FOCUS 14
27 October - 29 October 2014.
INTERPOL World 2015
14 April - 16 April 2015.

Editor's choice

Attackers bypass Sandworm patch with new 0-day

23 October 2014. | The Sandworm vulnerability has been patched, but unfortunately attackers have discovered a way to bypass the patch and continue with their targeted attacks.

Think before you share that file

22 October 2014. | File-sync-and-share services have shortcomings and beg the question of whether enterprises should be allowing such services in their business operations at all.

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

22 October 2014. | A new Windows zero-day vulnerability is being actively exploited in the wild.

OS X Yosemite's Spotlight Suggestions: Privacy killer or not?

21 October 2014. | Spotlight can now also be used to make searches on the Internet, and it sends the users' search queries and information about their physical location to Apple.

The Software Assurance Marketplace: A response to a challenging problem

20 October 2014. | The DHS Science and Technology Directorate has recognized how critical the state of software security is to the DHS mission.

Developing Lynis, an open source security auditing tool

15 October 2014. | Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening.


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //