Please turn on your JavaScript for this page to function normally.
BlackOS malicious web traffic managing software is on sale

Security researchers are keeping a close eye on underground cybercrime forums and are quick to spot new offerings, such as the BlackOS software package. Not to be confused …

US tech firms knew about and assisted with PRISM data collection

In a testimony before the Privacy and Civil Liberties Oversight Board, the NSA general council Rajesh De and his colleague stated on Wednesday that the tech companies that …

Over 31,000 IoT devices and computers infected by cryptocoin-mining worm

A new version of the Darlloz Linux worm, which targets Internet-enabled devices such as home routers and security cameras, computers running Intel x86 architectures as well as …

Oracle releases Java 8

Oracle has released Java Standard Edition (SE) 8, Java Development Kit (JDK) 8, and Java Runtime Environment (JRE) 8. The new releases work on Windows 8, Windows 7, Windows …

Tor warns of malicious Tor browser offered on the App Store

A public plea made on Twitter by Runa A. Sandvik, a (former?) developer with The Tor Project has turned the spotlight on a still unresolved issue of an apparently fake Tor …

Fake Malaysia Airlines Flight 370 video hides a backdoor

As the search for the missing Malaysia Airlines Flight 370 nears the end of the second week, cyber crooks are diversifying the attacks against users curious to know what …

NSA records a country’s phone calls, keeps the records for a month

By leveraging a surveillance system dubbed MYSTIC, the US National Security Agency has been recording all phone calls made in a foreign country for a period of 30 days, newly …

Aversion to new Facebook News Feed could lead to scams

Facebook has been gradually rolling out a new, more simplified design for users’ News Feed for a while now. It’s a given that some users won’t like the …

Thinking with Data: How to Turn Information into Insights

With the advent of computer systems and the Internet, data has become plentiful and easily accessible. The problem now is to separate the wheat from the chaff, and discover …

Gang wielding ColdFusion exploits expands botnet of hacked e-commerce sites

A German website of French automaker Citro?«n is the latest of the wide array of higher-profile webshop sites that have been compromised by a hacker gang leveraging Adobe …

Sally Beauty payment card data breach confirmed

International cosmetics retailer Sally Beauty Holdings has confirmed that it has suffered a data breach that resulted in the possible theft of payment card data stored in …

You can now buy smartphones with preinstalled spyware

Did you know that instead of installing a spying app on a target’s phone, you can now gift them one with the app already preinstalled on it? MTechnology LTD has released …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools