Please turn on your JavaScript for this page to function normally.
Exploiting vulnerabilities in media players to spread advanced malware

Trusteer’s research has shown that vulnerable media players are constantly targeted by malicious actors. Since in most environments media players exist on users’ …

EU sets huge fines for firms who violate users’ privacy

MEPs inserted stronger safeguards for EU citizens’ personal data that gets transferred to non-EU countries in a major overhaul of the EU’s data protection laws …

US announces transition of oversight over Internet’s domain name system

The US Commerce Department’s National Telecommunications and Information Administration (NTIA) announced its intent to transition key Internet domain name functions to …

What do a hacker expo and cutting-edge research have in common? Amsterdam!

Dhillon Andrew Kannabhiran is the Founder and CEO of Hack in The Box, and in this interview he introduces HITBSecConf Amsterdam and offers insight on what attendees can expect …

New authenticated encryption algorithm is resistant to multiple misuse

Nippon Telegraph and Telephone Corporation, Mitsubishi Electric Corporation and the University of Fukui have jointly developed an authenticated encryption algorithm offering …

Week in review: Target breach reaction fail, WordPress sites exploited in DDoS attack

Here’s an overview of some of last week’s most interesting news, podcasts, videos, interviews and articles: Latvia establishes a Cyber Defence Unit The newly …

As the World Wide Web turns 25, bots reign supreme

As the World Wide Web turns 25, we’ve just had another reminder of how far we’ve come. On March 10th, just two days before this milestone, Cryptome reported that …

Tax-related identity theft will rise

Tax-related identity theft has been on the rise for years and the ITRC predicts it won’t be slowing down in 2014. The Javelin Strategy & Research 2014 Identity …

GFI WirelessSentry brings Wi-Fi management to SMBs

GFI Software unveiled GFI WirelessSentry (GFI WiSe), a cloud-based solution designed to allow IT administrators to monitor, manage and secure their wireless networks. GFI WiSe …

Backdoor in Samsung Galaxy devices discovered

The developers of Replicant, a “fully free/libre version of Android”, have discovered a backdoor in a number of Samsung Galaxy devices that could allow attackers …

1Password 4.2 includes 30 new features

Popular OS X password manager 1Password reached version 4.2, which includes over 30 new features and improvements. 1Password mini You can now edit items directly within …

Netwrix releases six new auditing solutions

Netwrix released six new Netwrix Auditor solutions, each offered with up to five times more features than before. “As organizations work to implement comprehensive …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools