
Has Reddit been served with a National Security Letter?
Reddit has published its 2015 Transparency Report, and there is one thing missing from it: the entire section about national security requests. The same report for 2014 …

Flaw in HID door controllers lets attackers unlock doors, deactivate alarms
Trend Micro researcher Ricky Lawshae has unearthed a critical vulnerability in HID’s VertX and Edge door controllers. Exploiting the flaw is easy, and could result in …

Why SMBs need threat intelligence
Most of the innovative work being done in information security comes from to small to medium sized companies. At the same time, there’s a lack of security solutions for …

SMEs under attack, security readiness still low
When it comes to securing their data, SMEs remain several steps behind their larger counterparts. Some reasons for the disparity in security readiness may be that SMEs have …

Samas ransomware enters hospitals through vulnerable servers
There’s hardly a day anymore that we don’t hear about a hospital being hit with ransomware. But while most have been infected via phishing emails carrying or …

SideStepper vulnerability can be used to install malicious apps on iOS
Check Point researchers have identified SideStepper, a vulnerability that can be used to install malicious apps on iPhones and iPads to steal login credentials and sensitive …

Hackers breaching law firms for insider trading info
Two of the most prestigious law firms in the US, best known for their financial services and corporate practices, have had their computer networks compromised by hackers. …

Consumers living in smart homes are willing to sell personal data
A majority of respondents worldwide might be willing to share their personal data collected from their smart home with companies in exchange for money, and 70 percent agree …

Linux security isn’t enough to stop data breaches
There is a difference between the security of an operating system and the security of the data created, which is edited and manipulated by people and saved on the operating …

NIST security standard to protect credit cards, health information
For many years, when you swiped your credit card, your number would be stored on the card reader, making encryption difficult to implement. Now, after nearly a decade of …

Student bypasses Valve’s review process, publishes game on Steam
Sometimes the only way to get an organization to listen to you when it comes to existing vulnerabilities in their products is to exploit them yourself and make the proof of …

1,400+ vulnerabilities found in automated medical supply system
Security researchers have discovered 1,418 vulnerabilities in CareFusion’s Pyxis SupplyStation system – automated cabinets used to dispense medical supplies …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations