Please turn on your JavaScript for this page to function normally.
bomb
6000+ compromised online shops – and counting

A week ago, RiskIQ researchers revealed that over 100 online shops have, at one point in the last six months, been injected with malicious JavaScript code that exfiltrates …

Ubuntu
Ubuntu 16.10 released with hybrid cloud operations and Unity 8 developer preview

Released today, Ubuntu 16.10 comes with hybrid cloud operations, bare-metal cloud performance, the ability to lift-and-shift 80% of Linux VMs to machine containers, Kubernetes …

Geofeedia
Twitter, Facebook revoke access to social media surveillance software used by cops

Geofeedia, a US-based company that offers its social media aggregation platform “to a broad range of private and public sector clients”, also numbers among its …

email
WSF attachments are the latest malware delivery vehicle

Most users have by now learned not to open executable (.EXE), various MS Office, RTF and PDF files delivered via unsolicited emails, but malware peddlers are always trying out …

Laptop
Securing workspaces in a hyperconnected digital era

Enterprises that fail to offer employees a flexible, autonomous, and creative work environment are at risk of not attracting and retaining next-generation talent, according to …

biohazard
Most businesses don’t inspect cloud services for malware

The growing use of cloud services and the lack of visibility into sensitive information in the cloud can result in more damaging or costly data breaches, according to the …

burn
SSHowDowN Proxy attacks using IoT devices

Akamai’s Threat Research team has identified a recent spate of SSHowDowN Proxy attacks whereby attackers are using Internet of Things (IoT) devices to remotely generate …

patching cloud
Shadow IT intensifies cloud security risks

Lack of visibility into an organization’s use of cloud providers can lead to unauthorized access to data, improper handling and storage of data and improper data removal. As a …

Avtech IP cameras
130,000 Avtech IP cameras, DVRs can be easily roped into IoT botnets

Security researcher Gergely Eberhardt has unearthed over dozen of vulnerabilities in most IP cameras, NVRs and DVRs by Taiwanese manufacturer Avtech, including things like …

Signal disappearing messages
Signal users can now make their messages disappear

Open Whisper Systems’ Signal, the messaging app favoured by Edward Snowden and many other users who want and need to keep their communication safe and private, is now …

Dawnscanner
Scan Ruby-based apps for security issues with Dawnscanner

Dawnscanner is an open source static analysis scanner designed to review the security of web applications written in Ruby. Dawnscanner’s genesis Its developer, Paolo …

transformation
Identity-centric security: The killer app for digital transformation

Organizations are measuring the success of IT security beyond just breaches and compliance; they now are including business performance indicators that contribute directly to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools