Please turn on your JavaScript for this page to function normally.
ENISA: Industrial Control Systems require coordinated capability testing

EU’s cyber security Agency ENISA published a new report to give advice regarding the next steps towards coordinated testing of capability of the often outdated …

How to implement incident reporting in cloud computing

Cloud security incidents often catch the media’s attention as they affect large number of users. For example, recently a large storage service provider suffered an …

When can you trust web services to handle your data?

A new report by the EU’s cyber security agency ENISA analyses the conditions under which online security and privacy seals help users to evaluate the trustworthiness of …

An introduction to firmware analysis

This talk by Stefan Widmann gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an …

EU committee asks Snowden to testify via video link

With an overwhelming vote of 36-to-2 (plus one abstention), the members of the European Parliament’s Justice and Civil Liberties Committee have decided to extend an …

ENISA issues report on how to act after power cuts

EU cyber security Agency ENISA has issued a new report studying network outages caused by power cuts in detail, resulting in key findings and recommendations to the electronic …

Mariposa bot author sentenced to prison

Matjaz Skorjanc, a.k.a. Iserdo, was sentenced to four years and ten months in prison last week by the District Court in Maribor, Slovenia. He was found guilty of manufacturing …

Researchers demonstrate SD memory card hacking

Security researchers Andrew “bunnie” Huang and Sean “xobs” Cross have demonstrated that the only way to be absolutely sure that no one will be able to …

Consumers trust government bodies more than private organizations?

Despite high profile surveillance and data gathering incidents, consumers still appear to trust government bodies more than private sector organisations when it comes to …

How have consumer attitudes changed towards data security?

Over the last few years, data has become non-exclusive; with the information consumers create and leave behind now the stuff of headlines and documentaries. From swiping a …

Lead MEP presents preliminary conclusions on NSA inquiry

The European Parliament should consent to a trade deal with the US only if it makes no reference to data protection, says its Civil Liberties Committee in the preliminary …

Authentication using visual codes: what can go wrong

Several password replacement schemes have been suggested that use a visual code to log in. However the visual code can often be relayed, which opens up a major vulnerability. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools