Please turn on your JavaScript for this page to function normally.
Microsoft’s study into unsecure supply chains leads to botnet disruption

Microsoft’s Digital Crimes Unit has disrupted the functioning of yet another botnet by effecting a takedown of a domain which was also hosting over 500 different strains …

Chip and PIN payment card system vulnerable to “pre-play” attacks

The chip and PIN system employed by most European and Asian banks is definitely more secure than the magnetic strip one, but it doesn’t mean that it doesn’t have …

Apple, Amazon change their security policies following epic hack

In the aftermath of the spectacular hack that left former Gizmodo employee Mat Honan without access to his Twitter account, his Gmail, his iCloud account and with his iPhone, …

Gizmodo hack reveals worrying flaws in data management policies

Mat Honan, the former Gizmodo employee who’s personal Twitter account compromise resulted in the temporary hijacking of the tech blog’s Twitter account, has …

80% of “Olympic” domains are scammy

Popular global events such as the Olympic Games are a boon to cyber crooks, as they know for sure that a huge amount of people will be turning to the Internet to search for …

Researcher releases tool for cracking MS-CHAPv2, PPTP no longer secure

Moxie Marlinspike, the mind behind the Convergence SSL authenticity system, has presented at Defcon a tool that allows attackers to crack the MS-CHAPv2 authentication …

Blackhole exploit kit got upgraded

Phoenix and Blackhole are the most popular and widely used exploit kits because their creators are always tinkering with them and pushing out update and improved attack …

User education essential against social engineering attacks

The five-year analysis of data from Google’s Safe Browsing service shows that the threat landscape of today has evolved considerably from that of just five years ago, …

MySQL flaw allows attackers to easily connect to server

A simple but serious MySQL and MariaDB authentication bypass flaw has been revealed by MariaDB security coordinator Sergei Golubchik, and exploits targeting it have already …

Apple publishes iOS security guide

Apple has a reputation for being extremely reticent when it comes to discussing security in public – so much so that most of the security features their devices sport …

A basic shift in network defense

“In our industry, most of the companies we were working with have spent the the better part of the past ten years securing the perimeter of the network with intrusion …

World renowned experts to examine SSL governance

Just two months from its inauguration date at the RSA Conference in San Francisco on February 29, the Trustworthy Internet Movement (TIM) announced today that it has chosen …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools