Please turn on your JavaScript for this page to function normally.
quantum
WWW inventor Tim Berners-Lee opposes encryption backdoors

As the de-facto inventor of the world wide web, Sir Tim Berners-Lee’s opinions on things like online privacy and encryption backdoors should carry a lot more weight than …

money
Highest paying certifications, skills in demand revealed

Global Knowledge surveyed 14,000 IT and business professionals worldwide, and confirmed that individuals and organizations benefit from IT certification. Participants …

smile
15 new ransomware decryption tools added to No More Ransom

Nine months after the launch of the No More Ransom (NMR) project, an ever-growing number of law enforcement and private partners have joined the initiative, allowing more …

skull
45% of large British businesses sustained a successful ransomware attack

Over a third of British businesses (36 percent) are not very confident that efforts to completely eradicate a recent ransomware attack from work systems have been successful. …

danger
Trump signs into law repeal of US consumers’ online privacy protections

It’s official: US Internet service providers and mobile data carriers will be able to to sell or share its customers’ Web browsing and app usage history and other …

Android malware
iOS spyware Pegasus has an equally capable Android counterpart

Mobile security firm Lookout and Google have revealed the existence of Chrysaor (aka Pegasus for Android), a powerful espionage app that is believed by both companies to be …

Wi-Fi
Apple patches drive-by Wi-Fi flaw with emergency iOS patch

Less than a week after Apple pushed out iOS 10.3 comes an iOS emergency patch that all iDevice owners should implement as soon a possible. The security note accompanying iOS …

McAfee
Intel Security officially becomes McAfee again

McAfee has begun operating as a new standalone company. The launch of McAfee marks the closing of the previously announced investment by TPG and Intel Corporation (INTC) to …

Android apps
Through inter-app data sharing, Android apps can get your data without permission

With a newly developed toolsuite that can analyze Android apps and detect whether two or more of them can collude with each other to acquire information that they would …

password
Weak social network password security is more trouble than you think

53 percent of users haven’t changed their social network passwords in more than one year – with 20 percent having never changed their passwords at all, according to a …

biohazard
European companies hit with highly customizable ransomware

Panda Security researchers have been following and analyzing ransomware attacks that have been targeting European business for a few months now, and have tied them to the same …

email
Rollout of DMARC email security protocol needs to gain steam

Trust, from both customers and investors, is the most important currency for financial services companies. A breach of trust can break a bank, while maintaining trust leads to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools