Please turn on your JavaScript for this page to function normally.
Tor project
Tor Project exploring ways to keep its software and users safe

In view of the recent legal battle between the FBI and Apple regarding phone encryption, and this article revealing that there have been many instances where the US Department …

facepalm
Cyber crooks spread Surprise ransomware via TeamViewer

A new ransomware family has been encrypting users’ files and appending the .surprise extension to them. The malware itself doesn’t differ much from other similar …

mobile
Apple updates its products, fixes iMessages zero-day

On Monday Apple has pushed out updates for its many products: iOS, OS X, OS X Server, Safari, watchOS, tvOS, and Xcode. Of these, the most eagerly awaited was that for iOS, as …

password
Growing security negligence in the workplace

A surprising disconnect exists between employees’ growing concern over the security of their personal information and their attitudes toward data security practices in …

mobile payment encryption attack
Encryption securing money transfers on mobile phones can be broken

A group of researchers has proved that it is possible to break the encryption used by many mobile payment apps by simply measuring and analysing the electromagnetic radiation …

criminal
Carbanak cyber-thieves’ newest attacks exposed

The infamous Carbanak group is again doing what it does best: attacks and compromises financial institutions, and tries to steal as much money as possible from them by taking …

Apple Store
iOS zero-day breaks Apple’s iMessage encryption

A team of Johns Hopkins University researchers headed by computer science professor Matthew Green have discovered a zero-day flaw in Apple’s iOS encryption, which could …

analytics IT assets
Google offers binary comparison tool BinDiff for free

In case you missed it, Google announced on Friday that BinDiff, a comparison tool for binary files, can now be downloaded for free. The tool is used to spot differences and …

Insider threat protection with the DB Networks DBN-6300

Many high profile database breaches have resulted from the abuse of legitimate logon credentials. Identifying these apparent “insider threats” requires a new …

Keyboard
Lynis 2.2.0: New features, tests, and enhancements

Lynis is a popular open source security auditing tool, used to evaluate the security defenses of their Linux/Unix-based systems. It runs on the host itself, so it performs …

light
Demand for advanced DDoS mitigation on the rise

The increasing popularity of DDoS attacks as a tool to disrupt, harass, terrorize and sabotage online businesses is boosting demand for mitigation solutions. In the face of …

world in hand
Week in review: Android adware infiltrates devices’ firmware, malvertising hits big Internet players, iOS design flaw lets malware in

Week in review: Android adware infiltrates devices’ firmware, malvertising hits big Internet players, iOS design flaw lets malware in Here’s an overview of some of last …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools