
Telecrypt Decryptor foils ransomware’s simple encryption method
The recently spotted Telecrypt ransomware can be thwarted: malware analyst Nathan Scott has created a tool that decrypts the encrypted files. Telecrypt Decryptor works only if …

Consumers are still making basic security faux pas online
Security remains top of mind as over 70 per cent of consumers noted they always think about their security/privacy when shopping online, according to Centrify. Unfortunately, …

Cobalt hackers executed massive, synchronized ATM heists across Europe, Russia
A criminal group dubbed Cobalt is behind synchronized ATM heists that saw machines across Europe, CIS countries (including Russia), and Malaysia being raided simultaneously, …

Unidirectional communications in a bidirectional world
Unidirectional Security Gateways can replace firewalls in industrial network environments, providing absolute protection to control systems and operations networks from …

Was your data breach an inside job?
Kaspersky Lab revealed the current state of security threats among businesses and how their perception of threats compares to the reality of cybersecurity incidents …

This year’s most hackable holiday gifts
Intel Security announced its second annual McAfee Most Hackable Holiday Gifts list to identify potential security risks associated with hot-ticket items this holiday season. …

DDoS protection quiz-based training course
The DDoS Protection Bootcamp is the first online portal to provide in-depth technical training in the field of DDoS protection. This comprehensive quiz-based training course, …

Michigan State University database with 400,000 student and staff records breached
Michigan State University has announced on Friday that a university server and a database containing information on some 400,000 faculty, staff and students has been accessed …

Over 2.8 million cheap Android smartphones come with preinstalled backdoor
If you’re using a cheap Android smartphone manufactured or sold by BLU, Infinix, Doogee, Leagoo, IKU, Beeline or Xolo, you are likely wide open to Man-in-the-Middle …

Oracle buys Dyn
Oracle today announced that it has signed an agreement to acquire Dyn, a cloud-based Internet Performance and DNS provider that monitors, controls, and optimizes Internet …

German Android users bombarded with banking malware masquerading as legitimate apps
Fortinet researcher Kai Lu warns of a fake email app that is capable of stealing login credentials from 15 different mobile banking apps for German banks. “Once this …

Malware masquerading as an image spreads via Facebook
Malware spreading via Facebook has become a rare occurrence, but it does still occasionally crop up. The latest instance has been noticed by malware researcher Bart Blaze, and …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems