Please turn on your JavaScript for this page to function normally.
Hijacking connected cars with a $25 tool

A presentation by two Spanish researchers scheduled to take place later this month at the Black Hat conference in Las Vegas will apparently prove that hijacking modern cars …

Huawei’s Chinese connection continues to be source of suspicion

A day after it was announced that the UK government will investigate the employees at the Huawei’s Cyber Security Evaluation Center located in Banbury, Oxfordshire, …

The future of electronic payment: Smartphone authentication and facial recognition

Withdrawing cash from an ATMs by using a debit or credit card or paying with it at a point-of-sale may soon become a thing of the past, as several manufacturers have presented …

Apps exploiting Android “Master Key” bug offered on Google Play

Researchers from security firm Bitdefender have unearthed two relatively popular apps on Google Play that leverage the infamous Android “Master Key” bug, but …

Android backup sends unencrypted Wi-Fi passwords to Google

The recent revelations on how Internet giants such as Google, Yahoo, Apple and others are compelled by the US government to give its agencies access to user data have …

Researchers find, Google fixes Glass hijack flaw

Google Glass is scheduled to be made widely available to regular consumers by the end of this year, so the Internet giant has still time to fix the most obvious security flaws …

Microsoft helped NSA get around its encryption

It has been a bad month for US Internet giants, but things got even worse for Microsoft as the latest batch of NSA documents leaked by Edward Snowden revealed that the company …

Unusual Facebook spam campaign delivers malicious Macros

A bizarre spam / malware delivery campaign is currently targeting Facebook users. It starts with the offer to see a video of a girl performing a salacious act – and this …

Bug bounties are cheaper than hiring full-time bug hunters

Software companies that have instituted bug bounties are on the right track, a recently published report by researchers of the University of California, Berkeley computer …

Blue Coat Internet monitoring devices (mis)used in Iran, Syria, Sudan

Even though US sanctions should have made it impossible, filtering and Internet monitoring devices by US-based Blue Coat Systems can be found on many computer networks in …

Bluebox releases free scanner for Android “master key” bug

Bluebox Security, the mobile security startup that’s “working to save the world from information thievery”, has made a name for itself by finding and …

Feds asked to avoid DEF CON this year

Jeff Moss (aka “The Dark Tangent”), founder and director of the Black Hat conference and DEF CON, has officially announced that employees of US federal agencies …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools