Please turn on your JavaScript for this page to function normally.
Lock
The next step in the battle for consumer privacy?

A recent survey of 2,000 US individuals by Hide My Ass VPN showed some unnerving data: 63 percent of them have experienced online security issues, but only a little more than …

chromebooks
Hack Chromebook in guest mode, get $100,000

Google has once again upped the ante for bug hunters concentrating on Chrome, and is now offering $100,000 to anyone capable of achieving a compromise of a Chromebook or …

Android Marshmallow
Hotel replaces light switches with insecure Android tablets

Here’s another documented instance for the “insecure Internet of Things” annals, courtesy of CoreOS security developer Matthew Garrett. Garrett, who’s …

leak
Code.org website leaked volunteers’ email addresses

Code.org, the non-profit organization dedicated to increasing diversity in computer science, has admitted its website has been leaking volunteer email addresses. The discovery …

point
Bug in surveillance app opens Netgear NAS systems to compromise

A security vulnerability in the ReadyNAS Surveillance Application can be exploited by unauthenticated, remote attackers to gain root access to Netgear NAS systems, Sysdream …

Library
Infosec pros point at problem with CVE system, offer alternative

For the last 17 years, the American not-for-profit MITRE Corporation has been editing and maintaining the list of Common Vulnerabilities and Exposures (CVEs). Researchers who …

fingerprint
New ways to fingerprint Tor Browser users discovered

Users who want to remain anonymous online often opt for using the Tor Browser, which hides their real IP address, but there are techniques that (more or less) malicious actors …

Bug
Critical bug in libotr could open users of ChatSecure, Adium, Pidgin to compromise

A vulnerability in “libotr,” the C code implementation of the Off-the-Record (OTR) protocol that is used in many secure instant messengers such as ChatSecure, …

Businessman
Review: Breaking into Information Security

Breaking into Information Security is a practical guide for people outside and inside the information security industry. The former can find out how to put their foot in the …

Telematics Gateway Unit
Hacking Internet-connected trucks and buses

Among the things one can find with Shodan, the search engine for the Internet of Things, are trucks, buses and delivery vans that have been equipped with the Telematics …

Apple
KeRanger Mac ransomware is a rewrite of Linux Encoder

KeRanger, the recently discovered first functional Mac ransomware, is a copy of Linux Encoder, the crypto-ransomware first unearthed and analyzed in November 2015 by Dr. Web …

fix
Dell open sources DCEPT, a honeypot tool for detecting network intrusions

Dell SecureWorks researchers have developed a tool that allows Windows system administrators to detect network intrusion attempts and pinpoint them to the original source …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools