Please turn on your JavaScript for this page to function normally.
Google Chrome
Google Chrome update includes 15 security fixes

Google has released Chrome 51.0.2704.79 to address multiple vulnerabilities for Windows, Linux, and OS X. Exploitation of some of these vulnerabilities may allow a remote …

Saumil Shah, Saumil Shah, CEO at Net-Square
What 17 years as an infosec trainer have taught me

July 2016 shall see me complete 17 years in the infosec training circuit. It has been an amazing journey, with humble beginnings. How it all started I had a strong academic …

industry
Cyber risks for utilities, networks, and smart factories escalate

Three utilities companies in the Ukraine, the Israel National Electricity Authority and most recently a German nuclear power plant have suffered cyber attacks in recent …

Borderless Cyber Europe
Borderless Cyber Europe 2016 to emphasize the importance of threat intelligence sharing

On 8-9 September, OASIS will host Borderless Cyber Europe 2016 at the European Commission Headquarters in Brussels, Belgium. The excitement for this year’s event has …

hard drive
Mobile workforce exposes businesses to security vulnerabilities

U.S. business leaders are unprepared for the increased threat to information security that comes with flexible office environments. A Shred-it study shows that leaders are not …

Tor browser
Tor Browser 6.0 released

The Tor Browser lets you use Tor on Windows, OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser …

sharing
Identity fears are holding back the sharing economy

Businesses operating in the sharing economy are being held back by consumer fears over trust in the identity of the other party in the transaction, according to a new report …

Europe
GDPR: Essential glossary

GDPR is the acronym for General Data Protection Regulation, itself a shorthand for “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April …

eye
How visibility can help detect and counter DDoS attacks

It’s been proven that preventive medical strategies are more cost-effective for treatment and better solutions to support long-term health than reactive medical measures. …

criminal
Global profiles of the typical fraudster

Technology is an important tool to help companies fight fraud, but many are not succeeding in using data analytics as a primary tool for fraud detection. Meanwhile, fraudsters …

LG G3
Check Point finds dangerous vulnerabilities in LG mobile devices

Check Point found two vulnerabilities which can be used to elevate privileges on LG mobile devices to attack them remotely. These vulnerabilities are unique to LG devices, …

crime scene
Hacker imprisoned for stealing Bitcoin, selling botnet on Darkode

A Louisiana man was sentenced to 12 months and one day in prison for using a computer to steal money, hacking computers to obtain passwords, and attempting to sell information …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools