Please turn on your JavaScript for this page to function normally.
Lock
Global data privacy laws: The #1 cross-border e-discovery challenge

In the year since the EU’s rejection of Safe Harbor, there has been a spike in legal concern over cross-border data transfers, according to a survey by BDO Consulting. Sixty …

abstract, generic
Week in review: Kali Linux certification, cross-browser fingerprinting, most common passwords of 2016

Here’s an overview of some of last week’s most interesting news and articles: Fruitfly: Unusual Mac backdoor used for tightly targeted attacks? The malware – …

Meitu
Meitu photo retouching app may be invading your privacy

Have you heard about Meitu, the photo retouching mobile app that turns people into more cutesy or beautiful versions of themselves? Chances are that even if you don’t …

Western Union
Western Union admits it facilitated scammers, forfeits $586 million

Western Union has agreed to forfeit $586 million and enter into agreements with the Federal Trade Commission, the Justice Department, and several U.S. Attorneys’ Offices. …

ransomware
Satan: A new Ransomware as a Service

If you’ve been hit by ransomware that has scrambled the names of your encrypted files and has appended the .stn extension to them, you’ve been targeted by Satan …

bomb
Data breaches hit all-time record high, increase 40% in 2016

The number of U.S. data breaches tracked in 2016 hit an all-time record high of 1,093, according to a new report by the Identity Theft Resource Center (ITRC) and CyberScout. …

explode
New infosec products of the week​: January 20, 2017

Twistlock 1.7 comes with new runtime defense architecture Twistlock unveiled a new runtime defense architecture for its Twistlock 1.7 container security platform that enables …

vulnerability
Advancing a standard format for vendors to disclose cybersecurity vulnerabilities

Technology providers and their customers are joining forces to advance a standard format for vendors to disclose cybersecurity vulnerabilities. The work of the new OASIS …

talk
Most employees use unsanctioned group chat tools

Employees are sharing sensitive company information using group chat tools that are not officially sanctioned for use, according to SpiderOak. The survey consisted of 600 …

Abstract 7
Spora ransomware could become the new Locky

A recent decrease of Locky ransomware infections has been tied with the lack of activity of the Necurs botnet, which is used to deliver the malware directly to potential …

Oracle
Massive Oracle Critical Patch Update fixes 270 vulnerabilities

Oracle has released the first Critical Patch Update scheduled for 2017, and it’s massive. It fixes 270 vulnerabilities across multiple products, and over 100 of them are …

Apple
Apple’s malware problem is accelerating

For a long time, one of the most common reasons for buying an Apple computer over a Windows-based one was that the former was less susceptible to viruses and other malware. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools