Please turn on your JavaScript for this page to function normally.
Equation determines the optimal moment for a cyber attack

Two researchers have developed a mathematical model for discovering the optimal moment to deploy specific cyber weapons in their arsenal. In a research paper recently …

Trust but verify: Mozilla execs invite researchers to audit their code

The recent revelations about NSA surveillance efforts, and especially the claims that the agency has been persuading or forcing software developers to put in backdoors into …

Bitcoin cold storage and insurance services sprout

The pros and cons of using and investing in Bitcoin and crypto currency in general are no longer a mystery, and solutions to some of the problems are being presented almost …

Fake Target breach notification leads to phishing and complex scams

The extensive Target breach has resounded far and wide in US media, and its customers should worry about their personal or credit card information being misused. After the …

Neiman Marcus, three other US retailers breached

In the wake of the revelations that US retail giant Target has been targeted by cyber thieves comes the news that American luxury department store Neiman Marcus has also …

Sefnit Trojan endangers users even after removal

Remember when in late August 2013 the Tor anonymity network was hit with a sudden and massive influx of active clients connecting to it? It was later discovered that the spike …

EU committee asks Snowden to testify via video link

With an overwhelming vote of 36-to-2 (plus one abstention), the members of the European Parliament’s Justice and Civil Liberties Committee have decided to extend an …

Fake “Critical browser update” warnings lead to malware

If you have manually updated your browser in the last week or so, think back on how you did it. Did you look for the update yourself, or did you download one after being faced …

Bitcoin-stealing malware delivered via clever email campaign

Users of popular Bitcoin exchanges are being actively targeted by cyber crooks looking to syphon funds out of their digital wallets. When cyber crooks are looking to infect as …

Fake AV served to Dailymotion visitors via malicious ads

The extremely popular video-sharing website Dailymotion (dailymotion.com) has been found serving malicious ads that trigger fake infection warnings and try to make visitors …

Yahoo Mail now has HTTPS on by default

With a short blog post, Yahoo’s SVP of Communication Products Jeff Bonforte has announced that the company has started encrypting all connections between their users and …

NSA employee will remain as co-chair on crypto standards group

NSA employee Kevin Igoe will continue to be one of the two co-chairs of the Crypto Forum Research Group (CFRG), which helps the Internet Engineering Task Force (IETF) review …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools