Please turn on your JavaScript for this page to function normally.
Apple
Mac users beware! Scareware hides behind fake Flash Player update

Mac users are being targeted by scareware peddlers, warns SANS ISC CTO Johannes Ullrich. The malware is delivered in the form of a Flash Player update. The attack starts on …

Amazon
Fake Amazon survey-for-money offer leads to account compromise

Amazon users are being targeted with a clever phishing email impersonating the retail giant. “As a valued customer we would like to present you with an opportunity to …

Google
Google declares war against deceptive download buttons

There’s likely no Internet user that hasn’t, at some point, been tricked into clicking on a deceptive “download,” “install,” or …

brain
Harnessing artificial intelligence to build an army of virtual analysts

Enterprises of all types and sizes are continually probed and targeted by cyber attackers. It doesn’t matter whether they are after the company’s or their …

backdoor
Year-old crypto flaw in Socat created a potentially intentional backdoor

A backdoor has been discovered in Socat, a popular open-source network administration tool similar to Netcat, and its unclear how it hasn’t been spotted earlier or at …

Comodo Dragon
Comodo Internet Security installs insecure Chrome-based browser

Google researcher Tavis Ormandy has found more vulnerabilities in yet another security solution. This time it’s Comodo Internet Security and, according to this issue …

Fisher-Price Smart Toy
Security flaws discovered in smart toys and kids’ watches

Rapid7 researchers have unearthed serious flaws in two Internet of Things devices: The Fisher-Price Smart Toy, a “stuffed animal” type of toy that can interact …

Malwarebytes
Revelation of security bugs jumpstarts launch of Malwarebytes’ bug bounty program

Malwarebytes CEO Marcin Kleczynski has announced that the company has launched a bug bounty program in an effort to make its software more secure. “The Coordinated …

Android
Google plugs five critical Android vulnerabilities

Google has plugged nine Android security holes with its February Nexus security update. Of these, five are critical, four of high and one of moderate severity. Here’s …

eye
Banning encryption is useless when IoT devices can spy on users

For a while now the US intelligence and law enforcement community has been complaining about the rise of end-to-end encryption, and how it will prevent them from tracking …

NASA
Hackers claim to have hacked NASA, hijacked one of its drones

AnonSec hackers claim that they have breached a number of NASA’s systems, and they have published a data trove containing video recordings made by the agency’s …

Drone
Eagles vs drones: A low-tech solution for a high-tech problem?

The Dutch National Police is aware that the use of drones – and the number of drones incidents – is only going to increase as time goes by. So, they are trying to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools