Please turn on your JavaScript for this page to function normally.
Fire
The rise of polymorphic malware

97% of malware is unique to a specific endpoint, rendering signature-based security virtually useless. The data collected by Webroot throughout 2015 shows that today’s threats …

eye
Week in review: Linux Mint hack, crypto ransomware hits hospitals, and educating policymakers on cybersecurity

Here’s an overview of some of last week’s most interesting news and articles: Can poorly designed embedded devices kill? The industry is not taking safety and …

Linux
Protecting enterprise data centers from threats that target Linux servers

Today’s internet is largely powered by Linux servers, many of which have become the target of attackers looking to utilize this vast pool of resources for much larger and more …

lights
ServiceNow reinvents security response

ServiceNow is extending its automation and orchestration expertise to transform the way organizations respond to threats. Security Operations gives both security and IT teams …

San Francisco
CyberCalifornia initiative to facilitate research and innovation

More than ever, California stands at the forefront of new technologies based on the Internet of Things (IoT). We are also increasingly vulnerable, a fact underscored by …

Lock keyboard
Crypto ransomware hits German hospitals

At least three hospitals in the German state of North Rhine-Westphalia have been hit with crypto ransomware. One is Lukas Krankenhaus (Lukas Hospital) in Neuss, the second one …

iPhone
Apple says DoJ’s request for iPhone unlocking is unconstitutional

Apple has filed a motion to vacate the earlier court order that would force them to help the FBI access the contents of the iPhone of the San Bernardino gunman by creating a …

mobile
Is zero-effort computer security a dream?

Researchers from the University of Alabama at Birmingham and Aalto University have found vulnerabilities in a recently proposed user-verification security system for …

embedded
Can poorly designed embedded devices kill?

The industry is not taking safety and security seriously enough, according to the Barr Group, who conducted a survey to better understand the state of safety- and …

Porn clicker
Porn Clicker Android malware hits Google Play hard

In a little over seven months, cybercriminals using click-jacking mobile malware to earn affiliate income have managed to push over 340 instances of the malware into Google …

cyber microscope
Cyber microscope enables advanced security anomaly detection

Lewis Rhodes Labs introduced the Cyber Microscope for faster and more accurate anomaly detection. The new product is based upon a Cyber Optimized Neuromorphic Processor that …

Phantom
Phantom: Security automation and orchestration platform

The Phantom platform can integrate existing security technologies and provide a layer of “connective tissue” between otherwise disparate systems. Phantom was …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools