Please turn on your JavaScript for this page to function normally.
security camera
Exploitable gSOAP flaw exposes thousands of IoT devices to attack

Researchers have unearthed a serious vulnerability in gSOAP, an open source, third-party code library used by thousands of IoT by many different manufacturers. Senrio Labs …

Segway miniPRO
Critical security vulnerabilities enable full control of the Segway miniPRO electric scooter

New IOActive research exposes critical security vulnerabilities found in the Segway miniPRO electric scooter. If exploited, an attacker could bypass safety systems and …

transformation
Organizations seeking way to balance development agility with application security

A new DigiCert survey reveals that 98 percent of enterprises integrating their security teams into their existing DevOps methodologies. Or, at least they’re trying to. Their …

Google security
Google introduces new protections to prevent app-based account compromise

Google has implemented new protections that should considerably reduce the risk of potentially malicious apps gaining control of users’ Google account. There can be no …

hand
Two Iranians charged with hacking, stealing US missile design software

Two Iranians are accused of hacking of a US software company and the theft of missile design software restricted from export from the US without a license. Mohammed Reza …

cloud
Many businesses spend more than $100,000 annually on additional cloud security features

Businesses prefer storing data in the cloud but plan to invest in extra security precautions, according to B2B ratings and reviews firm Clutch. Nearly 70% of businesses on the …

Bluetooth mesh
Bluetooth now supports mesh networking, ideally suited for building automation

The Bluetooth Special Interest Group (SIG) announced today that Bluetooth technology now supports mesh networking. The new mesh capability enables many-to-many (m:m) device …

SambaCry
Attackers are taking over NAS devices via SambaCry flaw

A Samba remote code execution flaw patched in May is being exploited to compromise IoT devices running on different architectures (MIPS, ARM, PowerPC, etc.), Trend Micro …

USA flag
US data breaches surge, businesses and healthcare organizations hit hardest

The number of US data breaches tracked through June 30, 2017 hit a half-year record high of 791, according to recent numbers released by the Identity Theft Resource Center …

toy
Think twice before buying a smart toy for your child

For a while now, security researchers have been warning about the security and privacy dangers of many popular “smart” toys. While consumer protection …

cloud binary
Dow Jones customer data exposed due to cloud misconfiguration

US-based publishing and financial information firm Dow Jones & Company is the latest casualty of a cloud database misconfiguration error. In late May, UpGuard’s …

idea
AI technologies will be in almost every new software product by 2020

Market hype and growing interest in artificial intelligence (AI) are pushing established software vendors to introduce AI into their product strategy, creating considerable …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools