Please turn on your JavaScript for this page to function normally.
Cyber-espionage campaign targeting diplomatic and government institutions

Kaspersky Lab identified an elusive cyber-espionage campaign targeting diplomatic, governmental and scientific research organizations in several countries for at least five …

Vulnerability of oil and gas infrastructure drives security investments

Security of critical facilities remains the topmost priority for the global oil and gas industry. Escalating demand for oil and gas, the construction of new facilities, and …

Compliance auditing: The first step to cyber security

Assuring that your company complies with industry standards is imperative. Being compliant not only heightens your reputation and allows you to trade in some industries, it …

High volume biometric fingerprint and iris identification

Neurotechnology released MegaMatcher Accelerator 5.0, a multi-biometric software and hardware solution designed for large-scale projects that require high-volume, high-speed …

Automating security for developers with Minion

Minion is a security testing framework built by Mozilla to brdige the gap between developers and security testers. To do so, it enables developers to scan their projects using …

Browser Exploitation Framework LiveCD

The Browser Exploitation Framework (BeEF) is a penetration testing tool that focuses on the web browser. BeEF allows penetration testers to assess the actual security posture …

Tokenless authentication comes to the cloud

SecurEnvoy has partnered with PasswordBank to bring the leading tokenless two-factor authentication capabilities to the PasswordBank identity management offering. Customers …

Increase in targeted spam and phishing attacks via e-mail

The threat level in the field of e-mail security increased in 2012 and will continue to do so in 2013 – despite the fact that spam levels decreased by 53% in 2012 as …

Automotive black box protects cyber data

The U.S. government rulemaking proposal seeks to mandate an automotive black box / Event Data Recorder (EDR) that you cannot turn-off, disable, or remove. You vehicle may …

Mac Kung Fu, 2nd Edition: Tips, Tricks, Hints, and Hacks

Get over 400 quick and easy tips, tricks, hints and hacks in Mac Kung Fu, Second Edition. Exploit secret settings and hidden apps, push built-in tools to the limit, radically …

Week in review: Java 0-day wreaking havoc, hiding messages in Skype silences, Apple prevents popular app scam tactic

Here’s an overview of some of last week’s most interesting news and articles: Hiding secret messages in Skype silences A group of researchers from the Institute of …

IBM tops U.S. patent list for 2012

IBM received a record 6,478 patents in 2012 for inventions that will enable fundamental advancements across key domains including analytics, Big Data, cybersecurity, cloud, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools