Please turn on your JavaScript for this page to function normally.
Yahoo Mail accounts compromised in coordinated attack

Unknown attackers have attempted to access a number of Yahoo Mail accounts, the company warned on Thursday, and urged users to change their passwords even if they …

GitHub sets up bug bounty program

GitHub is the latest service to announce that they have started a security bug bounty program. “The idea is simple: hackers and security researchers find and report …

Beware of bogus Google “Suspicious sign-in prevented” emails

A very convincing phishing attempt aimed at harvesting users’ Google account credentials has been spotted by a security researcher (click on the screenshot to enlarge …

How to recover deleted or corrupted digital currency

The popularity of Bitcoin and other digital / cryptographic currency cannot be denied. Different users like using it for different reasons, but many agree that the question of …

“Honey Encryption” overwhelms attackers with fake results

Former RSA chief scientist Ari Juels is working on an innovative approach at encryption that could make cyber crooks’ like a lot more difficult. This new encryption …

New details about Target breach come to light

As data dumps of cards stolen in the Target breach continue to be sold on underground cybercrime forums, and the stolen information is being used to perform unauthorised …

Angry Birds website defaced by “anti-NSA” hacker

The official website of the popular Angry Birds game by Finnish company Rovio has been briefly defaced on Tuesday night, and has been made to sport the following image: The …

VPN bypass attack possible also on Android KitKat

Security researchers at Ben Gurion University in Israel are on a roll when it comes to discovering Android security flaws, and they revealed the existence of a critical flaw …

Java-based malware hits Windows, Mac and Linux

Kaspersky Lab researchers have recently analysed a piece of malware that works well on all three of the most popular computer operating systems – the only thing that it …

Android bootkit infects 350,000 devices

The first ever Android Trojan with bootkit capabilities has been discovered and analysed by Dr.Web researchers, who warn that the malware is already operating on some 350,000 …

Feds cloned TorMail server with future investigations in mind

TorMail users engaged in illegal activities might have felt more than a twinge of anxiety when it was confirmed last summer that the FBI took control of Freedom …

Fully functional trojanized FileZilla client steals FTP logins

Trojanized versions of the hugely popular FileZilla FTP client are being offered to unsuspecting users via hacked websites with fake content. “Malware installer GUI is …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools