Please turn on your JavaScript for this page to function normally.
car swerving hacking
It’s official: The FBI says car hacking is a real risk

With a public service announcement compiled jointly with the Department of Transportation and the National Highway Traffic and Safety Administration, the FBI has announced …

Android adware infiltrates devices’ firmware, Trend Micro apps

Dubbed Gmobi by Dr. Web researchers, the malware comes in the form of a software development kit (SDK), and has been found in several legitimate applications by well-known …

Head
MITRE offers temporary solution to the CVE assignment problem

MITRE’s short-term solution to the problem of slow CVE assignment is to set up an experimental system for issuing federated CVE IDs using a new format. “(…) …

fire
McAfee uses web beacons that can be used to track and serve advertising to users

A test of seven OEM laptops running Windows has shown consistent privacy and security issues, including an interesting revelation that the McAfee Antivirus running on six of …

Steam
Boom in Steam account hijacking is due to cheap Steam Stealers

With over 125 million active users, Valve’s Steam is the most popular online gaming platform in the world and, consequently, forms a huge pool of targets for cyber …

authentication
Customer Authentication: Multi-factor security from iovation

With most transactions now happening online, providing customers with a frictionless online experience that’s also highly secure is critical for today’s businesses. Still, …

Lock
Companies still lack adequate data privacy tools

93 percent of IT professionals agree that customer data privacy concerns are a critical issue at the C-level. Yet, only 9 percent percent believe current privacy and consent …

MobSF
MobSF: Security analysis of Android and iOS apps

The Mobile Security Framework (MobSF) is an open source framework capable of performing end to end security testing of mobile applications. MobSF can be used for security …

keyboard
Insight into critical data remains limited

SANS surveyed 829 IT professionals with endpoints located around the globe to explore how IT professionals monitor, assess, protect and investigate their endpoints. A majority …

Apple iOS 9
AceDeceiver iOS malware exploits Apple design flaw to infect non-jailbroken devices

Malware developers have found another hole in Apple’s iOS defenses, and this one, according to Palo Alto researchers, will be difficult to plug. The newly discovered …

https
Google starts tracking, encourages worldwide HTTPS usage

Google has added a new section to its Transparency Report, which will allow users to keep an eye on Google’s use of HTTPS, and HTTPS use of the top 100 non-Google sites …

CLTRe
Security CLTRe Toolkit: Build and improve security culture

Norwegian security culture startup CLTRe has announced today at CeBIT its Security CLTRe Toolkit. The SaaS-based toolkit will provide organizations from SMEs to large …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools