Please turn on your JavaScript for this page to function normally.
CPU
Researchers set to work on malware-detecting CPUs

Adding hardware protections to software ones to block the ever-increasing onslaught of computer malware seems like a solid idea, and a group of researchers have just been …

checklist
A checklist for people who understand cyber security

By now, it’s pretty much an accepted reality that it’s only a matter of time until an organization – any organization – gets breached by cyber …

Telegram
Telecrypt ransomware uses Telegram for command and control

Telecrypt, a newly spotted piece of crypto ransomware that uses Telegram’s communication protocol to deliver the decryption key to the crooks, is targeting Russian-speaking …

bomb
Pawn Storm raced to pop many targets before Windows zero-day patch release

As promised, Microsoft provided this Tuesday a patch for the Windows zero-day (CVE-2016-7855) actively exploited by the Strontium (aka Pawn Storm) cyber espionage hacking …

danger
Google Safe Browsing goes after repeat offenders

Google has had enough of sites that repeatedly endanger end users, either through malware, unwanted software, phishing or other social engineering and deceptive tactics. …

magnify
Signal Protocol’s crypto core has no major flaws, researchers find

A group of computer science and cryptography professors and doctoral students has effected a security analysis of the secure messaging Signal Protocol – specifically, of …

trojan
TrickBot banking Trojan is the next big threat

After months of testing, a new banking Trojan called TrickBot is being aggressively slung at owners of personal and business bank accounts in UK and Australia. …

Broken glass
OAuth2.0 implementation flaw allows attackers to pop Android users’ accounts

Incorrect OAuth2.0 implementation by third party mobile app developers has opened users of those apps to account compromise, three researchers from the Chinese University of …

Chrome mobile
Bug in Chrome for mobile exploited for drive-by Android malware downloads

Users of the mobile version of Google Chrome should be extra careful when faced with unsolicited offers to install a popular app, Kaspersky Lab researchers warn. Cyber crooks …

Abstract
Dutch police takes over darknet market, posts warning

As law enforcement agencies around the world continue taking down online markets on the Dark Web, the Dutch National Police and the nation’s Public Prosecution Service …

The Basics of Cyber Safety
Review: The Basics of Cyber Safety

About the authors John Sammons is an Associate Professor and Director of the undergraduate program in Digital Forensics and Information Assurance at Marshall University in …

Tech support scam
Tech support scammers use old bug to freeze browsers

Tech support scammers are exploiting a bug that maxes out users’ CPU and memory capability and effectively freezes the browser and possibly the computer, in an attempt …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools