Please turn on your JavaScript for this page to function normally.
Cloud
Cloud providers not expanding security as fast as customers adopt cloud

Information security professionals trust the cloud even less now than they did last year, despite efforts by cloud-service providers to tighten security, according to the SANS …

Windows Hello
Unlocking Windows 10 PCs with smartphones, wearables, smart cards

With Windows 10, Microsoft is slowly moving towards removing passwords as the main authentication method for users to log in to their (locked) computers. Windows Hello, the …

Polyglot ransomware decryption tool released

Kaspersky Lab experts have released a Polyglot ransomware decryption tool, which enables users who have suffered from this ransomware, also known as MarsJoke, to restore their …

virtual reality
Augmented Reality market to experience explosive growth

The Augmented Reality market size at $659.7 million in 2015 is anticipated to reach $80.8 billion by 2022, according to ReportsnReports. The AR market goes from $659.7 million …

Android malware
DressCode Android malware found in 3,000 apps

When Check Point researchers unearthed more than 40 apps on Google Play (and 400 on third party app stores) infected with the so-called DressCode malware in late October, it …

IoT
Leaked: Source code for Mirai IoT DDoS botnet

IoT-powered DDoS attacks are on the rise, and the situation is poised to become even worse now that the source code for the Mirai malware has been made public. Reporter Brian …

nmap
Nmap 7.30: New NSE scripts, Npcap, fingerprints

Nmap 7.30 is the first stable release since 7.12 back in March. Apart from bug fixes, it comes with new features, including more NSE scripts, an improved version of Npcap …

abstract
Digital disruptors demand a new approach to IT

Digital disruptors such as algorithms, artificial intelligence (AI), bots and chatbots are already transforming businesses. Gartner expects that algorithmic business will …

IEEE 802.3bz standard brings 2.5 and 5 Gb/s to existing cabling

The Ethernet Alliance hailed ratification of IEEE 802.3bz, Standard for Ethernet Amendment: Media Access Control Parameters, Physical Layers and Management Parameters for 2.5 …

world in hand
Week in review: Securing ICS, and the reasons behind risky password practices

Here’s an overview of some of last week’s most interesting news and articles: Yahoo breach was not state-sponsored, researchers claim The massive 2014 Yahoo breach …

mask
DefecTor: DNS-enhanced correlation attacks against Tor users

A group of researchers from Princeton University, Karlstad University and KTH Royal Institute of Technology have devised two new correlation attacks that can be leveraged to …

Arduino ESLOV IoT
Arduino’s new open source kit makes creating IoT devices easy

The Arduino team is using Kickstarter to crowdfund their latest project: the ESLOV IoT Invention Kit. ESLOV is a system of intelligent modules that can be connected in an …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools