Please turn on your JavaScript for this page to function normally.
GitHub’s new search reveals passwords and private keys

GitHub, the popular online source code repository, has unveiled on Wednesday a new search infrastructure that should help coders find specific code within the millions of the …

(IN)SECURE Magazine issue 36 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 36 has been released today. Table of contents: …

Facebook’s “Hacktober” tests employees’ security awareness

Since 2004, October has been dubbed “National Cyber Security Awareness Month,” and many security-minded individuals, businesses and organizations make it a point …

Thwart attackers’ search for info by ditching out-of-office notifications

When it comes to successfully defending organizations from targeted attacks, IT administrators must be aware that attention to every detail – no matter how small – …

First European Cyber Security Month going well

Halfway through the first European Cyber Security Month (ECSM), the pilot campaign has already reached 1,986,270 people on Facebook Europe-wide. In addition, a special …

Google alerts users about new state-sponsored attacks

Remember when in June Google announced its intention to start warning Gmail users that their account might be targeted by state-sponsored attackers? A clear warning above the …

Information-related risks, threats and compliance

Dr. Eric Cole is a security expert with over 20 years of hands-on experience. He is a member of the Commission on Cyber Security for the 44th President and several executive …

How to recognize rogue online pharmacies

As the prices of pharmaceuticals keep rising, so does the popularity of online pharmacies. Crooks noticed the high earning potential of rogue online pharmacies from the very …

Microsoft’s study into unsecure supply chains leads to botnet disruption

Microsoft’s Digital Crimes Unit has disrupted the functioning of yet another botnet by effecting a takedown of a domain which was also hosting over 500 different strains …

Chip and PIN payment card system vulnerable to “pre-play” attacks

The chip and PIN system employed by most European and Asian banks is definitely more secure than the magnetic strip one, but it doesn’t mean that it doesn’t have …

Apple, Amazon change their security policies following epic hack

In the aftermath of the spectacular hack that left former Gizmodo employee Mat Honan without access to his Twitter account, his Gmail, his iCloud account and with his iPhone, …

Gizmodo hack reveals worrying flaws in data management policies

Mat Honan, the former Gizmodo employee who’s personal Twitter account compromise resulted in the temporary hijacking of the tech blog’s Twitter account, has …

Don't miss

Cybersecurity news