Please turn on your JavaScript for this page to function normally.
Five steps to take to protect your passwords

A report issued this week claimed that a Russian cybercrime group stole 1.2 billion usernames and passwords from 420,000 websites. While some security experts question the …

Gemalto to acquire SafeNet

Gemalto has signed a definitive agreement to acquire 100% of the share capital of SafeNet, a worldwide leader in data protection and software monetization, from Vector Capital …

Oracle introduces vault for encryption keys, wallet files

Encryption is widely recognized as the gold standard for protecting data privacy, but encryption is only as strong as its key management. Critical credential files such as …

Photo gallery: A walk through Black Hat’s Business Hall

This gallery from Black Hat features: Qualys, Blue Coat Systems, FireEye, Shape Security, Michael Schrenk, Gigamon, Securonix, ThreatTrack Security.

Free Android app identifies and uninstalls spyware

At Black Hat, SnoopWall announced the release of Privacy App for Android platform mobile devices. Privacy App is based upon the company’s counterveillance technology. It …

Two Gameover Zeus variants targeting Europe and beyond

Bitdefender has identified two Gameover Zeus variants in the wild: one of them generates 1,000 domains per day and the other generates 10,000 per day. The UK is currently the …

Turla cyber-espionage campaign puzzle solved

Turla, also known as Snake or Uroburos is one of the most sophisticated ongoing cyber-espionage campaigns. When the first research on Turla/Snake/Uroburos was published, it …

Prioritizing vulnerabilities to close gaps where it matters

Core Security announced the latest version of the Core Attack Intelligence Platform, which consolidates, prioritizes and validates the overwhelming quantity of vulnerabilities …

Photo gallery: Black Hat USA 2014 Business Hall

The Black Hat conference is underway at the Mandalay Bay in Las Vegas, and the “business” part of the conference is bustling. Featured vendors and people: Qualys, …

SWSIS program awards cybersecurity scholarships to women

Responding to a shortage of cybersecurity professionals across the United States and a dearth of women in the field, Applied Computer Security Associates (ACSA) and the …

Deploying and monitoring honeypots made easy

At the Black Hat conference, LogRhythm released a new analytics suite that monitors honeypots to track would-be attackers, enabling customers to analyze nefarious tactics and …

92% of brands fail email security test

The Online Trust Alliance (OTA), the non-profit with the mission to enhance online trust and empower users, announced the results of its 2014 Email Integrity Audit report, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools