Please turn on your JavaScript for this page to function normally.
decision
Stethoscope spurs employees to implement better security practices

Every now and then, Netflix open sources some of the security tools created by its coders. The latest example of this is Stethoscope, a web application that collects …

unmask mask digital persona
Uncloaking Tor Browser users with DRM-protected files

Digital Rights Management (DRM)-protected media files can be used to reveal Tor Browser users’ actual IP address and therefore possibly reveal their identity, …

Firefox
Firefox 51 starts flagging HTTP login pages as insecure

Mozilla has released Firefox 51 on Tuesday, and this latest stable version of the popular browser comes with many security fixes and improvements. The list of security …

Meitu
Meitu photo retouching app may be invading your privacy

Have you heard about Meitu, the photo retouching mobile app that turns people into more cutesy or beautiful versions of themselves? Chances are that even if you don’t …

Car
Open source cybersecurity framework for the automotive industry

A consortium of researchers announced the development of a universal, free, and open source framework to protect wireless software updates in vehicles. The team issued a …

Redefining the role of security in software development

Software is becoming increasingly important for market success, driving an ever greater need for speed in the development process. The rapid adoption of DevOps is testimony to …

research
New infosec products of the week​: January 13, 2017

Denim Group enhances ThreadFix platform Denim Group, a leading independent application security firm, today announced the latest version of ThreadFix, the company’s …

snake
Risky sites have never been easier to exploit

46% of the Internet’s top 1 million web sites, as ranked by Alexa, are risky. This is largely due to vulnerable software running on web servers and on underlying ad …

attack
McAfee Virus Scan Enterprise opens Linux machines to remote attackers

Security researcher Andrew Fasano has discovered a multitude of vulnerabilities in McAfee Virus Scan Enterprise product for Linux – vulnerabilities that can be chained …

Money
Zcash mining software covertly installed on victims’ machines

Software “mining” the recently established Zcash (ZEC) cryptocurrency is being foisted upon unsuspecting users, Kaspersky Lab warns. The actual software is not …

Sony IP camera
80 Sony IP camera models come with backdoors

80 different models of Sony IPELA Engine IP Cameras have multiple backdoors that can be misused by attackers to take control of the device, disrupt its functionality, add it …

Nintendo
Nintendo offers up to $20,000 for bug info

Video game giant Nintendo has set up a bug bounty program through HackerOne’s platform, and is asking researchers to find and flag vulnerabilities in the Nintendo 3DS …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools