Please turn on your JavaScript for this page to function normally.
smartphone
Organizations to gradually replace physical access cards with smartphones

In 2016, less than 5 percent of organizations used smartphones to enable access to offices and other premises. By 2020, Gartner said that 20 percent of organizations will use …

RSA Conference Innovation Sandbox
RSA Conference Innovation Sandbox Contest 2017 finalists announced

RSA Conference announced the 10 finalists for its annual Innovation Sandbox Contest. The competition is dedicated to encouraging out-of-the-box ideas and the exploration of …

fingerprint
Accurate cross-browser fingerprinting is possible, researchers show

A group of researchers have come up with a browser fingerprinting technique that can allow interested parties to “identify” users across different browsers (on the …

magnifying glass
Security audit of Dovecot mailserver reveals good security practices

Dovecot – a popular open source IMAP and POP3 server for Linux/UNIX-like systems – is as secure as its developers claim it is. A security audit performed by German …

keys
Key Transparency: A secure directory of public encryption keys

Google has released Key Transparency, an open source public directory meant to simplify the discovery of intended recipients’ public encryption key. The project is still …

patch
Patch and security management take 8 hours per month for most companies

Shavlik and AppSense used VMworld Europe 2016 to collect data from frontline experts, and to highlight patch management and security concerns in corporations. A total of 178 …

biohazard
Significant decrease in Locky ransomware attacks

Locky ransomware attacks have dramatically decreased during December 2016, according to Check Point. Locky, which uses massive spam campaigns as a major distribution vector, …

Data science tasks
40% of data science tasks will be automated by 2020

More than 40 percent of data science tasks will be automated by 2020, resulting in increased productivity and broader usage of data and analytics by citizen data scientists, …

documents
SWIFT systems of three Indian banks compromised to create fake trade documents

Since last year’s revelation that attackers have compromised SWIFT software of Bangladesh’s central bank and used it to perform fraudulent transfers worth tens of …

Gmail
New Gmail phishing technique fools even tech-savvy users

An effective new phishing attack is hitting Gmail users and tricking many into inputing their credentials into a fake login page. How the attack unfolds The phishers start by …

password
The most common passwords of 2016

Despite having been predicted many times, the demise of the password as the preferred authentication method is still far off, as it’s difficult to beat its ease of use. …

smile
Data Privacy Day reminds digital citizens to better manage their privacy

Many consumers do not fully understand how their information is collected, used and stored by the devices, apps and websites they use every day. According to a recent Pew …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools