Please turn on your JavaScript for this page to function normally.
justice sentence gavel law court
Liberty Reserve founder sentenced to 20 years for money laundering

Arthur Budovsky was sentenced in the Southern District of New York to 20 years imprisonment for running a massive money laundering enterprise through his company Liberty …

Hands
Fraudsters loot W-2 data stored by Equifax

Equifax, one of the big-three US credit bureaus, has been targeted by fraudsters that search for W-2 data and use it for claiming fraudulent tax returns. But the company …

bomb
Exploit kits are the greatest danger for Windows users

Exploit kits are how most malware gets on victims’ computers and, according to Microsoft, encounters with exploit kits increased by more than a third from 3Q15 to 4Q15. …

Internet of Fail
Internet of Fail: How modern devices expose our lives

Should you sync your family’s calendar to your refrigerator or have it display photos? Samsung believes you should. They also think you need cameras that display the …

skull
New ransomware modifications increase 14%

Kaspersky Lab detected 2,896 new ransomware modifications during the first quarter, which is an increase of 14 percent on the previous quarter. In addition, the number of …

risk
How small businesses approach risk mitigation and response

CSID released the findings of a survey recently conducted for small businesses (under 10 employees) to determine sentiment and concerns from small business owners around cyber …

Week in review: ImageMagick 0day, and why you need a Security Evangelist

Here’s an overview of some of last week’s most interesting news, reviews and articles: Web servers and sites under attack via ImageMagick zero-day flaw The flaw …

Android Trojan pesters victims, won’t take no for an answer

If an app won’t stop badgering you to give it administrator rights to your Android device, chances are you have picked up malware somewhere. Malware peddlers are …

professional
Companies are hungry for professional open source talent

Recruiting open source talent is a top priority for hiring managers focused on recruiting technology talent, and recruiters are increasingly looking for more professional …

talk speak speaker
For PoC exploits, go on Twitter

Proof-of-Concept exploits are increasingly being shared and discussed online, threat intelligence firm Recorded Future has discovered. Between March 22, 2015 and the present …

Keyboard
Build security design principles into cyber-physical systems

We are immersed in a cyber-physical world. Information technology is deeply embedded in traditionally non-IT systems, including automobiles, the electric grid and emergency …

Imperva Incapsula DDoS whitepaper
Whitepaper: Protecting financial institutions from DDoS attacks

In response to the growing DDoS threat, the FFIEC issued a statement requiring banks and financial institutions to monitor their networks for DDoS attacks and proactively …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools