Please turn on your JavaScript for this page to function normally.
burn
Betabot steals passwords, downloads ransomware

The infamous and ever-changing Betabot information-stealing Trojan is back again, and has been observed downloading another well-known threat – the Cerber ransomware. Of …

London
London economy hit hard by security breaches

A new report by the Conservative members on the London Assembly, which help scrutinise the work of the Mayor of London, estimates that in 2015 in London 329,515 organizations …

Dropbox
60+ million Dropbox login credentials have been stolen

A breach disclosed by Dropbox in 2012 has resulted in the theft of usernames and hashed and salted passwords of over 60 million users. At the time, the company did not give …

OneLogin
OneLogin breached, customers’ Secure Notes compromised

San Francisco-based OneLogin, which offers single sign-on and identity management for cloud-based applications and claims 1400+ enterprise customers in 44 countries, has …

businessman
What differentiates a great CIO from simply a good one?

Earlier this month, Sophos announced the appointment of Tony Young as the company’s new global Chief Information Officer (CIO). Young started his career as a software …

Europe
Definitive EU net neutrality guidelines released

The Body of European Regulators for Electronic Communications (BEREC) has published the final guidelines aimed at helping EU member states’ National Regulatory …

Chrome
Google Chrome impersonator Trojan doing rounds

If you’re a Google Chrome user, and suddenly your browser looks a bit off and shows you pages that you would never visit ordinarily, you’ve probably been hit with …

Linux servers hit with FairWare ransomware – or is it just a scam?

Users posting on Bleeping Computer’s forums have alerted the world to a new threat targeting Linux server admins: the FairWare ransomware. Whether the ransomware …

USB
USBee makes USB devices transmit data from air-gapped computers

After devising ways of exfiltrating data from air-gapped computers via mobile phones, using radio frequencies, heat, rogue software that transmits electromagnetic signals at …

doors
How to choose a perfect data control solution for your enterprise

Not long ago, people used to come to work and work off of a desktop computer, tied to the network. Today, they work on their mobile devices, physically untethered to it. In …

Google Chrome
Google Chrome users targeted by tech support scammers

Google Chrome users, beware: tech support scammers are misusing helpful browser features to impersonate Microsoft and to bombard users users with pop-ups. In the first …

D-Link NAS
XSS flaw in D-Link NAS devices allows attackers to mess with your data

Security researcher Benjamin Daniel Mussler has unearthed an XSS flaw affecting seven D-Link NAS devices – a flaw which could allow attackers to access the devices and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools