Please turn on your JavaScript for this page to function normally.
brain
US artificial intelligence market set to surge

The artificial intelligence market in the US is projected to grow at a CAGR of 75% until 2021 on account of increasing AI technology adoption, according to TechSci Research. …

meeting room
How executives really feel about infosec reports

More than half of IT and security executives will lose their jobs as a result of failing to provide useful, actionable information. While the majority of board members say …

Pestudio
Pestudio: Initial malware assessment made simple

Malicious executables often attempt to hide their behavior and evade detection. By doing so, they present anomalies and suspicious patterns. Pestudio is a free tool that …

Warberry Pi
Tactical exploitation with Warberry Pi

WarBerry Pi was built for red team engagements where it’s essential to obtain as much information as possible in a short period of time, while going undetected. All you need …

Hashcat
Developing Hashcat, a tool for advanced password recovery

As general-purpose computing on graphics processing units (GPGPU) became more viable around 2009, professional software developer Jens “atom” Steube wanted to …

0patch
0patch: Microscopic cures for big security holes

Software vulnerabilities are one of today’s most significant information security issues. Disclosing high profile vulnerabilities has become tremendously rewarding, to the …

users
The future of Identity Management: Passwords and the cloud

Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance. With a surge in cybercrime, it’s no wonder that …

Eyes
The life of a social engineer: Hacking the human

A clean-cut guy with rimmed glasses and a warm smile, Jayson E. Street looks nothing like the stereotypical hacker regularly portrayed in movies (i.e. pale, grim and …

Gboard
Gboard enhances your keyboard, but what about your privacy?

Gboard is a Google app for your iPhone that lets you search and send information, GIFs, emojis and more, right from your keyboard. You can search and send anything from …

mobile devices
The fragile security of the mobile ecosystem

Mobile devices such as smartphones and tablets have become indispensable in our daily lives. In fact, in Q4 2015, smartphones accounted for around 75 percent of all mobile …

Internet of Fail
Internet of Fail: How modern devices expose our lives

Should you sync your family’s calendar to your refrigerator or have it display photos? Samsung believes you should. They also think you need cameras that display the …

world biohazard
Geopolitical events fuel uptick in region-specific DDoS attacks

An attack research group was the No.1 target of DDoS attacks, and the Middle East region also saw a sharp increase in attacks last quarter, according to Nexusguard. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools