Please turn on your JavaScript for this page to function normally.
professional
Why the C-suite should care about cybersecurity

Many leaders across the C-suite are confused about who the true cybersecurity adversary is and how to effectively combat them. IBM Security interviewed CxOs, from 28 …

W3C
W3C launches effort to replace passwords

The World Wide Web Consortium (W3C) is launching a new standards effort in web authentication that aims to offer a more secure and flexible alternative to password-based …

Broken glass
E-commerce web apps vulnerable to hijacking, database compromise

High-Tech Bridge researchers have published details and PoC exploit code for several serious vulnerabilities in Osclass, osCmax, and osCommerce, three popular open source …

WordPress
Is your WordPress site being misused for DDoS attacks?

Many WordPress websites are still being misused to perform layer 7 DDoS attacks against target servers, even though preventing them from participating in these attacks is as …

Bitcoin
Hollywood hospital pays ransom to get their computers, files back

The Hollywood hospital whose systems have been infected with ransomware has paid $17,000 to get the decryption key from the criminals, and is operating normally once again. …

money
Fighting malware monetization and application vulnerabilities

As the traditional network perimeter disappears and attack surfaces grow, security professionals are challenged with protecting users, applications and data – without …

point
Why a single point of failure should be your primary concern

Many organizations are transitioning to digital systems, which has increased the dependency on cloud service providers, web hosting platforms, and other external services. …

binary
DB Networks launches Layer 7 Database Sensor

DB Networks introduced a product that provides OEM partners with real-time deep protocol analysis of database traffic. By integrating this technology into their products, …

Apple will fight court order to unlock gunman’s iPhone

A US magistrate judge has ordered Apple to help the FBI gain access to the contents of a PIN-locked iPhone 5C used by Syed Farook, one of the shooters in the San Bernardino …

terminal
Critical Glibc flaw opens Linux distros, other software and devices to compromise

A critical bug has been found to open an unimaginable number of computers, networking and other connected devices to attacks that can result in complete system compromise. …

desk
(IN)SECURE Magazine issue 49 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 49 has been released today. Table of contents …

robot
Dridex botnet alive and well, now also spreading ransomware

Last October’s disruption of the Dridex botnet by UK and US law enforcement agencies and the arrest of a Moldovan bot master have not lead to the death of the botnet. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools