Please turn on your JavaScript for this page to function normally.
lights
Week in review: Top 10 web hacking techniques, exploit kit targets Android devices

Here’s an overview of some of last week’s most interesting news, reviews and articles: US Supreme Court approves expansion of FBI hacking powers The US Supreme …

keyboard
US Supreme Court approves expansion of FBI hacking powers

The US Supreme Court has approved on Thursday several changes to the federal rules around search warrants, one of which would allow US federal law enforcement agents to …

Android
Screen overlay Android malware is on the rise

As predicted, the ability to lay screens over legitimate (e.g. banking) apps is becoming a crucial feature for the success of Android malware. The capability was first seen in …

prison cell jail
Suspect refuses to decrypt hard drives, is detained indefinitely

A former Philadelphia Police Department sergeant suspected of possessing child pornography has spent seven months in a detention center without being charged of any particular …

ISIS
Pro-ISIS hackers: Tactics, methodology and tools

While the threat that emanates from ISIS-inspired cyber attacks is of high concern, especially in light of the formation of a new United Cyber Caliphate composed of previously …

user
1 in 10 people have posed as someone else online

Our need for ease and convenience is putting our digital identities and security at risk. A new BehavioSec report finds that 37% of us have shared our personal security data …

The challenges of controlling IT complexity

IT teams overwhelmingly feel that today’s IT environments are very complex – and that growing complexity is making it more difficult for them to do their jobs successfully, …

key
Defend encrypted data from quantum computer threat

If an exotic quantum computer is invented that could break the codes we depend on to protect confidential electronic information, what will we do to maintain our security and …

Tor
Former Tor developer helped the FBI unmask Tor users

A developer who used to work at Tor Project is the mastermind behind “Torsploit” (aka “Cornhusker”), the malware that was used by the FBI in 2012 to …

credit cards secure
PCI DSS 3.2 is out: What’s new?

The Payment Card Industry Security Standards Council has published the latest version of PCI DSS, the information security standard for organizations that handle customer …

rings
Gold-mining firm Goldcorp hacked, its data leaked online

Canadian gold-mining company Goldcorp has suffered a data breach of seemingly catastrophic proportions. On Tuesday, the attackers leaked a lot of sensitive internal data about …

Businessman
Do you have what it takes to be an independent security consultant?

It doesn’t matter if you’re part of a big enterprise or a small company, you’ve probably wondered at least once what it would be like to work for yourself. Dreams …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools