Please turn on your JavaScript for this page to function normally.
hands
Tor Project gets whole new board of directors

Tor Project’s entire board of directors has stepped down and announced their successors. Among them are the noted “security guru” Bruce Schneier and Cindy …

accept
“I agree to these terms and conditions” is the biggest lie on the Internet

Two communications professors have proven what we all anecdotally knew to be true: the overwhelming majority of Internet users doesn’t read services’ terms of …

bug
Microsoft splats bug that turns printers into drive-by exploit kits

In this month’s Patch Tuesday, Microsoft has released 11 sets of patches – 6 “critical” and 5 “important.” The good news is that none of …

key
Shard: Open source tool checks for password re-use

Security researcher Philip O’Keefe has created a tool that allows users to check whether they have reused a password on multiple accounts. The impetus behind the …

anti-ransomware
Researchers create effective anti-ransomware solution

Are you willing to sacrifice a dozen or so of your files in order to save the rest from the grasping hands of modern crypto-ransomware? I believe that the answer from most …

Pokemon GO
Pokémon GO gets full access to players’ Google account

Pokémon GO, the mobile augmented reality game that has become hugely popular in record time, brings with it a lot of unexpected dangers. Its popularity has been exploited by …

DataDog
System monitoring company Datadog suffers breach

The team behind Datadog, a widely used SaaS-based monitoring and analytics platform for IT infrastructure, operations and development teams, has announced on Friday that they …

Phone
Hacking smartphones via voice commands hidden in YouTube videos

A group of researchers from Georgetown University and UC Berkeley have demonstrated how voice commands hidden in YouTube videos can be used by malicious attackers to …

Pokemon Go
Playing Pokémon GO can lead to unexpected dangers

Interest in Pokémon GO, the mobile augmented reality game that has users going places in the real world to capture, train, and battle with virtual Pokemon, has exploded the …

fb secret conversations
Secret Conversations: End-to-end encryption for Facebook Messenger

After integrating Open Whisper Systems’ Signal Protocol into WhatsApp earlier this year, Facebook has done the same to the Facebook Messenger app, and called the feature …

BMW ConnectedDrive
BMW ConnectedDrive flaws could be misused to tamper with car settings

Security researcher Benjamin Kunz Mejri has found two vulnerabilities in the BMW ConnectedDrive web portal/web application. About the vulnerabilities in BMW ConnectedDrive The …

Firefox
Kovter malware masquerades as Firefox update

Click-ad-fraud Kovter malware, packaged as a legitimate Firefox browser update, is being delivered to unsuspecting victims via drive-by-download attacks. Kovter, which also …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools