Please turn on your JavaScript for this page to function normally.
Juniper Networks
ISC’s infocon turns yellow to reflect critical impact of Juniper backdoors

SANS Institute’s Internet Storm Center has raised its infocon status – the status of the condition of the Internet infrastructure – from green to yellow, …

encryption
Human error reduces security offered by encryption apps

Crypto phones – whether they are hardware devices or mobile apps – are a great way to assure that your VoIP communications remain private, but the security and …

GCHQ
GCHQ open sources Gaffer, a data collection and mining framework

GCHQ, the UK equivalent of the US National Security Agency (NSA), has released on Monday the source code of Gaffer, a graph database that optimised for “retrieving data …

End-to-end encrypted database ZeroDB is now open source

ZeroDB, an end-to-end encrypted database whose release was announced earlier this year, is now open source. Developers MacLane Wilkison and Michael Egorov changed the license …

Signal secure messaging app now available on the desktop

The Open Whisper Systems nonprofit has released the beta version of their Signal secure messaging app for desktop computers.Signal is often recommended by privacy-minded …

Flaws in medical data management system can be exploited to modify patient information

Two vulnerabilities found in v3.3 of Epiphany’s Cardio Server ECG Management System, a popular system that is used to centralize and manage patient data by healthcare …

Custom secure apps are gaining popularity in the enterprise

It looks like organizations are increasingly building custom secure apps. Among Good Powered by BlackBerry customers who are building custom apps, the average organization has …

Telegram Android app is a stalker’s dream

Popular instant messaging service Telegram provides optional end-to-end encrypted messaging and, in general, is highly focused on protecting user privacy.Despite these …

IBM cloud tool enables privacy-preserving user authentication

Identity Mixer, a new tool to protect a consumer’s personally identifiable information, is now generally available on IBM Cloud. The tool is built on years of cryptography …

Four ways an attacker can infiltrate an organization by diverting security solutions

Employing one of the many security solutions on the market today does not mean your organization is immune to infiltration – that much is clear from the constant string …

Network protocol analyzer Wireshark 2.0 released

Wireshark, the most popular network protocol analyzer, has reached version 2.0. It features a completely new user interface which should provide a smoother, faster user …

Analytics services are tracking users via Chrome extensions

It’s quite possible that, despite your belief that the Google Chrome is the safest browser there is and your use of extensions that prevent tracking, your online …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools