
Unsecured security cameras lead to privacy erosion
The results of a recent analysis of some 6,000 open security cameras across the United States has shown that 15 percent of them are located in users’ private homes. Open …

Most businesses would not pay in the event of a ransomware attack
Business owners in the U.S. recognize the severity of ransomware and the potential disruption to business operations, yet 84 percent say they would not pay in the event of a …

Changes to Rule 41 will increase law enforcement hacking, surveillance
The Electronic Frontier Foundation (EFF), the Tor Project, and dozens of other organizations are calling on citizens and website operators to take action to block a new rule …

Supporting the IT edge is expensive, full of potential security risks
Organizations are facing multiple challenges when managing the IT edge – at remote and branch offices. A Riverbed survey asked IT professionals about the various challenges …

Blackphone users get a virtual privacy assistant
Silent Circle has pushed out a new version of Silent OS, the operating system running on Blackphone 2 devices, and it comes with several privacy and security enhancements, …

Poorly crafted LogMeIn password reset email looks phishy, but isn’t
LogMeIn has been sending out password reset emails to some of its customers, to prevent account hijacking fuelled by the recent spate of massive login credential leaks. …

Malware families attacking business networks continue to grow
The number of active global malware families increased by 15 percent in May 2016, according to Check Point. They detected 2,300 unique and active malware families attacking …

Botnet-powered account takeover campaign hit unnamed bank
A single attacker has mounted two massive account takeover (ATO) campaigns against a financial institution and an entertainment company earlier this year, and used a gigantic …

There’s no virus in the iTunes database – it’s a phish!
A new phishing campaign aimed at Apple users has been spotted by security researcher Bryan Campbell. It takes the form of a fake email supposedly sent by Apple Service, …

Tor Project tests new tool for foiling deanonymization attacks
Upcoming hardened releases of the Tor Browser will use a new technique aimed at preventing deanonymization efforts by anyone who might want to mount them. Created by a group …

Red Hat launches Ansible-native container workflow project
Red Hat launched Ansible Container under the Ansible project, which provides a simple, powerful, and agentless open source IT automation framework. Available now as a …

Bloatware-be-gone refresh tool added to Windows 10
In the latest test build of Windows 10 Anniversary Update released last week, Microsoft has introduced a tool that allows users to get rid of bloatware and crapware with one …
Featured news
Resources
Don't miss
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works