Please turn on your JavaScript for this page to function normally.
US air traffic control system is riddled with vulnerabilities

A recently released report by the US Government Accountability Office has revealed that despite some improvements, the Federal Aviation Administration (FAA) still needs to …

Security framework for governments deploying the cloud

ENISA released a framework structured into four phases, nine security activities and fourteen steps that details the set of actions Member States should follow to define and …

Cisco, Apple, Citrix products no longer welcome on Chinese government systems

A slew of US tech companies have been dropped from China’s Ministry of Finance’s approved government procurement list, including Apple, McAfee, Citrix Systems and …

3 million strong RAMNIT botnet taken down

The National Crime Agency’s National Cyber Crime Unit (NCCU) worked with law enforcement colleagues in the Netherlands, Italy and Germany, co-ordinated through …

Gemalto says NSA and GCHQ intrusions “probably happened”

“The investigation into the intrusion methods described in the document and the sophisticated attacks that Gemalto detected in 2010 and 2011 give us reasonable grounds …

Continuous Diagnostics and Mitigation capability requirements need re-prioritization

There is a lot to like in the $6 billion Continuous Diagnostics and Mitigation (CDM) program being administered by the DHS across more than 100 federal civilian agencies. The …

Citizenfour awarded Oscar for Best Documentary

Film director Laura Poitras’ Citizenfour has been recognized as past year’s Best Documentary Feature by the Academy of Motion Picture Arts and Sciences. Most of …

Gemalto announces investigation of massive SIM heist

Yesterday’s report by The Intercept hit the information security community like a ton of bricks, as a set of documents from Edward Snowden’s trove indicate that …

Cyber readiness across government and critical infrastructure industries

While the frequency and severity of cyberattacks against organizations are on the rise, a majority of IT leaders do not feel confident in their leaderships’ ability to …

Pwn2Own 2015: New rules, prizes, and potential problems

If you intend to participate in the Pwn2Own competition at the CanSecWest 2015 conference on March 18 and 19 in Vancouver, Canada, you would do well to consult with a legal …

Jeb Bush dumps emails full of private data online

Jeb Bush, who might end up being a candidate in the next 2016 US presidential election, has made a clumsy misstep in his attempt to provide “transparency” into his …

Car hacking and hijacking is too easy, report says

A report released on Monday by US Senator Edward Markey has confirmed what we already suspected: automobile manufacturers have yet to effectively deal with the threat of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools