Please turn on your JavaScript for this page to function normally.
US government security background checks fumbled by investigators

Edward Snowden’s successful exfiltration of confidential NSA documents has proved that the background checks executed for government personnel in order to receive the …

Amateur hacker behind DDoS attack on China?

When, in late August, China’s Domain Name Service was targeted by a huge DDoS attack which ultimately lead to many websites being completely inaccessible for a period of …

Data broker databases breached, stolen info used by ID theft service

Stolen users information is regularly sold and bought online by cyber crooks and attackers, and many services have sprung up to meet the demand for information that can be …

Yahoo ID recycling scheme is potential security minefield

Yahoo’s recently announced email account / Yahoo ID recycling scheme was meant to free up inactive (and attractive) accounts so that they can be snapped up by another …

Researcher despairs of critical SIM flaws being fixed before attacks happen

Two months have passed since researcher Karsten Nohl announced that he has found and managed to leverage critical flaws in the encryption technology used by some SIM cards, …

A short overview of Android banking malware

As more and more people use their mobile phones to do their online banking, money transfers, and so on, cyber crooks wielding banking malware are increasingly turning to …

IE 0-day attack reports push ISC to raise official threat level

Over the weekend, FireEye researchers have managed to shed some light on the in-the-wild attacks leveraging the latest discovered Internet Explorer zero-day vulnerability …

RSA advises customers to stop using NSA-influenced encryption algorithm

In the wake of the disclosure that the NSA has influenced NIST to adopt an encryption standard that includes one random bit generator with a weakness known only to the …

Clever email campaign delivers deadly ransomware to orgs

A new type of ransomware that obviously concentrates on targeting organizations instead of home users has been spotted by Emsisoft researchers. Dubbed CryptoLocker, the …

Belgacom was breached by Britain’s GCHQ

Earlier this week, the primarily state owned Belgacom – the largest telecom in Belgium, with customers such as the European Commission, Council and Parliament – …

Websites of energy sector companies compromised in watering hole attack

The websites of nearly a dozen energy sector companies have been compromised to serve as so-called “watering holes”, where visitors would be served with malware or …

Researchers discover ties between TDSS and ZeroAccess rootkit families

A lot has been said and written about the long-lasting TDSS (or TDL) and the considerably newer ZeroAccess (or Sirefef) rootkits, and the similarities between the two have …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools