Please turn on your JavaScript for this page to function normally.
Sierra Wireless
Mirai malware is infecting Sierra Wireless cellular network equipment

AirLink cellular gateway devices by Sierra Wireless are being infected by the infamous Mirai malware. Sierra Airlink models LS300, GX400, GX/ES440, GX/ES450, and RV50 are …

ENISA Cyber Europe
Cyber Europe 2016: Analyzing realistic cybersecurity incidents

The European ICT Industry is one of the most advanced in the world. Making the EU’s single market fit for the digital age could contribute €415 billion per year to the …

1Password Windows
Released: 1Password Teams for Windows

AgileBits, the company behind popular password manager 1Password, has finally released 1Password Teams for Windows (6.0). 1Password Teams works just like the individual …

hourglass
Week in review: Social media surveillance, ransomware recovery, US accuses Russia of hacking

Here’s an overview of some of last week’s most interesting news, reviews and articles: Twitter, Facebook revoke access to social media surveillance software used …

Eyes
Clinton campaign chief’s Twitter, iCloud accounts hijacked

Some 12 hours after WikiLeaks published emails stolen from the email account of Hillary Clinton campaign Chairman John Podesta, someone has hijacked the man’s Twitter …

terminal
Quickly audit and adjust SSH server configurations with SSH-audit

SSH-audit is a standalone open source tool for auditing and fixing SSH server configurations. It has no dependencies and will run wherever Python is available. It supports …

cloud
Alarming cloud encryption misconceptions revealed

Businesses have a high level of concern about the exposure of sensitive and regulated data in the cloud to security threats. Yet despite this, the majority of data owners …

building
Worldwide security technology revenue to surpass $100 billion in 2020

Worldwide revenues for security-related hardware, software, and services will grow from $73.7 billion in 2016 to $101.6 billion in 2020. This represents a compound annual …

traffic
1 in 5 executives take risks with sensitive data to meet regulatory demands

The Anti-Money Laundering Directive (AML), the EU-US Privacy Shield and the Market Abuse Directive (MAD) and Regulation (MAR) are the three biggest regulatory pressures across …

Linksys WRT3200ACM
New Linksys WRT3200ACM open source Wi-Fi router is optimization ready

Linksys announced the next generation of its one and only WRT router – the WRT3200ACM. It features Tri-Stream 160 technology creating the fastest Dual Band router …

face
How identity and access management is critical in the digital transformation process

Digital transformation is a top priority and source of anxiety for enterprises, but the majority of IT decision makers have not completed technology deployments to address the …

Berlin
Global cyber security leaders to gather in Berlin

A series of reports over the summer have shown not only that cybercrime is more persistent than ever, but there are also more opportunities. The growth of technology, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools