Please turn on your JavaScript for this page to function normally.
Search
You are what you click: Online search security risks

When it comes to the desire for the ideal body, people may be willing to sacrifice their online security if it takes them a step closer to achieving desired results, according …

Laptop
How developers fight the rise in web application attacks

Recent reports highlight the challenge faced by developers in securing code as attacks against web applications increase, while security budgets for developers remain low, …

Phone
Phone metadata can reveal sensitive info about individuals

Since Snowden revealed that the NSA collects from Verizon phone records of US citizens on a daily basis, those who support that kind of collection have been repeatedly …

protect identity
FindFace app heralds the end of public anonymity and privacy?

While Facebook battles in court to be allowed to use its facial recognition tech (which it already gave up using in Europe), another company – whose facial recognition …

bitly
Bitly partners with Let’s Encrypt for HTTPS links

Bitly processes data associated with more than 12 billion clicks per month, leading to massive troves of intelligence. Now, they’re partnering with Let’s Encrypt …

Gmail
Google drops support for old crypto on Gmail, SMTP servers

In less than a month, Google will stop supporting SSLv3 and RC4 on its SMTP and Gmail’s web servers. The end of support is not unexpected, as the Internet giant announced the …

windows locker tech support scam
Tech support scammers start locking Windows computers

Tech support scammers have come up with a new way to trick users into sharing their payment card information: screen lockers showing fake Windows alerts telling users that …

ATM
Criminals turn entire ATMs into skimmers

As if withdrawing money from an ATM wasn’t dangerous enough, researchers discovered that Russian-speaking Skimer group forces ATMs to assist them in stealing users’ …

dollar
Cybercrime economy: The business of hacking

The profile of typical cyber attackers – and the interconnected nature of their underground economy – have evolved in the last several years. Adversaries are …

Accessibility clickjacking attacks
Almost all Android users vulnerable to Accessibility Clickjacking attacks

Symantec researchers recently posited that Android banking malware with screen overlay capabilities might soon start tricking users into turning on Android’s Accessibility …

users
Only two percent of IT experts consider third-party secure access a top priority

Soha Systems released a report based on a survey conducted by the newly formed Soha Third-Party Advisory Group, which consists of security and IT experts from Aberdeen Group, …

acecard pop ups
Black Jack Free app carries deadly banking Trojan

Despite Google’s best efforts, malware peddlers occasionally manage to get their malicious wares on Google Play. The latest example of this unfortunate reality is an app …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools