Please turn on your JavaScript for this page to function normally.
Week in review: Logjam bug, trojanized PuTTY, and the importance of encryption and key management

Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles:European Internet users urged to protect themselves against …

Week in review: VENOM bug, infosec and ethics, and flawed crypto endangers smart grid devices

Here’s an overview of some of last week’s most interesting news, podcasts and articles:IoT and the great data heistWith the introduction of new mobile devices in …

Week in review: Illegal surveillance, WordPress insecurity, cheap computer kill switch

Here’s an overview of some of last week’s most interesting news, podcasts and articles:Securing the smart grid: European Network of Cyber SecurityDr. Klaus Kursawe …

Week in review: Researchers hack surgery robot, 5-year-old malware turns Linux servers into spamming machines

Here’s an overview of some of last week’s most interesting news, podcasts and articles:The invasion of biometricsDepending on where you stand biometrics is a good …

Week in review: RSA Conference 2015, security guidance, mobile malware

Here’s an overview of some of last week’s most interesting news and articles. We also have in-depth coverage of RSA Conference 2015, with product releases, news, …

Week in review: APT wars, 18-year-old bug endangers Windows users, and main sources of data breaches

Here’s an overview of some of last week’s most interesting news and articles:Simda botnet taken down in global operationThe Simda botnet, believed to have infected …

Week in review: Apple closes OS X backdoor, cyber crooks go after enterprise millions, and what happens to data after a breach

Here’s an overview of some of last week’s most interesting news and articles: How to protect from threats against USB enabled devices USB can be an effective and …

Week in review: Security tips for DevOps, and how security pros deal with cybercrime extortion

Here’s an overview of some of last week’s most interesting news, reviews and articles: 10 practical security tips for DevOps More organizations are embracing …

Week in review: Hacking air-gapped computers using heat, car hacking, malware threat to virtual currencies

Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: New PoS malware family comes with keylogger component Dubbed …

Week in review: Security risks of networked medical devices, mobile apps still vulnerable to FREAK attacks

Here’s an overview of some of last week’s most interesting news and articles: Why senior managers need to be involved in data security There is now a growing …

Week in review: Shadow IT, crypto-ransomware goes after gamers, and the security of smartwatches

Here’s an overview of some of last week’s most interesting news and articles: Hack yourself first: How we can take the fight to the black hats Threats are no …

Week in review: FREAK flaw, a new PoS malware family, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, interviews and articles: A threat assessment of 7 million iOS and Android apps Android malware is …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools