Please turn on your JavaScript for this page to function normally.
Week in review: Malicious USB device firmware, insecure IoT devices, and using Hollywood to improve your security program

Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: What influences corporate security strategies? Sixty eight …

Week in review: Tails 0-days, iOS backdoors, and the psychology of phishing

Here’s an overview of some of last week’s most interesting news, interviews and articles: EFF invites hackers to test, secure its Open Wireless Router The …

Week in review: Vulnerable web-based password managers, Mayhem malware, and Google’s Project Zero

Here’s an overview of some of last week’s most interesting news, interviews and articles: Endpoint security myths and why they persist In this interview, Roman …

Week in review: Google catches India with fake certificates, and the risks of selling used smartphones

Here’s an overview of some of last week’s most interesting news, interviews, reviews and articles: Exploring the mobile security landscape In this interview, Adam …

Week in review: DDoS attacks becoming more effective, and how to build trust between business and IT

Here’s an overview of some of last week’s most interesting news, articles and interviews: Gathering and using threat intelligence In this interview, Tomer Teller, …

Week in review: “Lawful interception” mobile malware, top infosec tech in 2014, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 42 released (IN)SECURE Magazine is a free …

Week in review: GCHQ intercepts Google, Facebook users’ communications, Code Spaces destroyed by extortion hack attack

Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Five great computer security tips that few people follow Here …

Week in review: Replicating NSA’s gadgets using open source, World Cup-themed threats, and life after TrueCrypt

Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Replicating NSA’s gadgets using open source In this …

Week in review: Defeating UEFI’s SecureBoot, Gameover Zeus botnet disrupted, first Android file-encrypting Trojan

Here’s an overview of some of last week’s most interesting news, interviews, podcasts and articles: International action against Gameover Zeus botnet and …

Week in review: Apple devices hijacked in blackmail scheme, inside the malware war zone, and hacking for the greater good

Here’s an overview of some of last week’s most interesting news, interviews, reports and articles: In wake of breach, eBay has to deal with multiple web …

Week in review: eBay breach, Linux Trojans, US charges Chinese military hackers for spying on US firms

Here’s an overview of some of last week’s most interesting news, podcasts, and articles: Record month for Linux Trojans If you think that you are protected from …

Week in review: Forged SSL certs in the wild, NSA allegedly backdoors network devices, (IN)SECURE Mag special issue released

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Bitly breach details revealed Bitly has released more details about the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools