Please turn on your JavaScript for this page to function normally.
GPG Sync
GPG Sync: Internal GPG keys syncing tool for orgs

First Look Code has released GPG Sync, an open source tool for keeping a list of GPG keys used by members of an organization always updated, and always available to all of …

Wireless
Public Wi-Fi: Users’ habits and perceptions of risk

A new Xirrus survey highlights users’ habits and perceptions of risk when connecting to public Wi-Fi. The survey polled more than 2,000 business users, including executives …

medical money
Securing medical devices: Cybersecurity spending to triple by 2021

The medical IoT is set to transform healthcare through smart medical devices. However, their success is in jeopardy if cybersecurity concerns are not addressed immediately.

abstract
Civilization infrastructure: Connected sensors and digital intelligence

A new type of infrastructure needs to be built that is not just going to reshape business, but also the way people live, according to Gartner. CIOs are the builders of this …

VeraCrypt
VeraCrypt security audit reveals many flaws, some already patched

VeraCrypt, the free, open source disk encryption software based on TrueCrypt, has been audited by experts from cybersecurity company Quarkslab. The researchers found 8 …

Android graffiti
Ghost Push Trojan still a major threat to most Android users

The Ghost Push Trojan (also known as Shedun) is still a considerable threat to Android users around the world. The malware is focused on displaying ads, promoting webpages and …

skull binary
Fight fraud: Scams, identity theft, ransomware attacks

In an increasingly technology-oriented world, cybercrime has become all too common for both consumers and businesses. Internet crime takes many forms and includes everything …

NetSess
Net Cease: Microsoft researchers unveil anti-reconnaissance tool

Microsoft researchers Itai Grady and Tal Be’ery have released Net Cease, a PowerShell script that prevents attackers who have already compromised an endpoint from …

Business ideas
Critical cybersecurity priorities for the next US president

While the US presidential campaign has occasionally focused on cyber security, the topic demands more urgent attention from the individual elected as the 45th President of the …

money
How much law firms dedicate to data privacy and security

Vulnerabilities in law firms’ data security present an unprecedented existential threat, while increasing corporate demand for legal expertise in information security, …

Send selfies ID cards
Android banking Trojan asks victims to send selfies with ID cards

The Acecard Android Trojan is a threat that has been around for quite some time. Its main goal is to collect login credentials used by the victims to access their online …

Europol
13 countries join global ransomware fight

Just three months after the successful launch of the No More Ransom project, law enforcement agencies from a further 13 countries have signed up to fight ransomware together …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools