Please turn on your JavaScript for this page to function normally.
Linux Server Security
Review: Linux Server Security

About the author Chris Binnie is a Technical Consultant with 20 years of experience working with Linux systems, and a writer for Linux Magazine and Admin Magazine. He built an …

Apple
Keydnap malware opens backdoor, goes after passwords in OS X keychain

ESET researchers have revealed the existence of another new piece of malware aimed at Mac machines and users: Keydnap. Keydnap has the ability to steal passwords and keys …

Android Marshmallow
Google fixes 108 bugs in July Android security update

Google has released an unusually hefty Android Security Bulletin for July. In fact, so many vulnerabilities have been fixed – 108 in all – that the patches come in …

Magnify
Author of potentially malicious OS X Pirrit adware discovered

An unnamed web developer working for Israeli marketing and advertising company TargetingEdge is the creator of the Pirrit adware targeting Mac machines, Cybereason security …

Apple
New Mac OS X backdoor disguised as document converter app

Bitdefender researchers have discovered and analyzed a new, highly dangerous piece of malware targeting Mac systems and users. The malware, dubbed “Eleanor,” opens …

explode
Exploit for GNU wget RCE flaw revealed

Technical details about a serious vulnerability affecting all but the latest version of the GNU wget software have been released online, along with PoC exploit scenarios. …

IoT
Netherlands, South Korea get nationwide IoT network

In the space of a week, the Netherlands and South Korea got their own, nationwide IoT network. Late last week, Dutch telecom KPN announced that its LoRa (Long Range) network …

TPLINK admin
TP-LINK loses control of two device configuration domains

Security researcher Amitay Dan warns that tplinklogin.net, a domain through which TP-LINK router owners can configure their devices, is no longer owned by the company, and …

Locky ransomware variant Zepto hits users via email

A new version of Locky ransomware that has been dubbed “Zepto” due to the .zepto extension added to encrypted files is successfully extorting users around the …

Android Marshmallow
How online learning algorithms can help improve Android malware detection

A group of researchers from Nanyang Technological University, Singapore, have created a novel solution for large-scale Android malware detection. It’s called DroidOL, …

LibreOffice
Easily exploitable LibreOffice flaw is a godsend for hackers

A serious LibreOffice flaw can be easily exploited by attackers to deliver malware on computers running a vulnerable version of the popular free and open source office suite. …

windows10 anniversary update
Windows 10 Anniversary Update brings security improvements

Microsoft has scheduled the release of Windows 10 Anniversary Update for August 2. Aside from new and/or improved tools to aid with productivity, gaming, device set-up, and a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools