Please turn on your JavaScript for this page to function normally.
Tips for securely using free Tube Wi-Fi

GFI Software warned of potential data and device security concerns posed by using London’s public Wi-Fi service, installed across large parts of the London Underground …

Destroy solid state storage and optical media

Data Security unveiled their SSMD-2mm Destruction Device which disintegrates solid state and optical media to particles 2mm in size or smaller. NSA has evaluated the SSMD-2mm …

Malware attacks occur every three minutes

Malware activity has become so pervasive that organizations experience a malicious email file attachment or Web link as well as malware communication that evades legacy …

Ciphertex releases 24TB portable, secure NAS server

The new 24TB portable, highly secure NAS server from Ciphertex is meant for backup, disaster recovery and business continuity, file sharing and virtualization. “The …

Security professionals don’t have secure mobile habits

Security professionals have embraced BYOD and they’re taking “anytime, anywhere” access to some pretty interesting locations according a new survey by Ping …

DIY: Using trust to secure embedded projects

This talk from Shmoocon 2013 provides a DIY guide to using Trusted Computing on embedded devices. The authors introduce a low-cost schematic using Atmel’s CryptoModule …

Tips for avoiding tax scams

As the April 15 deadline for tax filing draws near, the Center for Internet Security (CIS) helps users recognize tax-related scams and better defend against them. Findings …

F-Secure rebuilds free Online Scanner

F-Secure’s free Online Scanner tool has been completely rebuilt to be faster, lighter and more powerful than before, and now even cleans up advanced rootkits, the most …

Blocking zero-day application exploits: A new approach for APT prevention

Cybercriminals continue to develop new methods to bypass security controls in order to install malware on corporate endpoints. The recently discovered advanced persistent …

The security risks of using Wi-Fi on the Tube

The arrival of widespread public Wi-Fi access across London Underground has been broadly welcomed by the general public, particularly those with smartphones and tablets who …

Defending the Internet at scale

A decade ago, engineers tackled the C10K scalability problems that prevented servers from handling more than 10,000 concurrent connections. This problem was solved by fixing …

Aggressive Android adware and malware on the rise

With adware gleaning more user data from people devices than they would normally need too and developers bundle more than one adware framework into their apps, user privacy is …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools