Please turn on your JavaScript for this page to function normally.
hard drive
Most used drives sold on eBay hold personal information

Ecommerce sites are reselling used electronics without permanently erasing data from them. Based on an analysis of 200 second-hand hard disk drives and solid state drives …

The Network Ops DDoS Playbook
The Network Ops DDoS Playbook

With the prevalence of DDoS attacks, good preparation and planning can go a long way toward making the DDoS response process as manageable, painless, and inexpensive as …

danger
Businesses are unprepared for emerging threats

Organizations are failing to appreciate the growing challenges of protecting their data and, as a result, are experiencing the economic impact of data loss, according to EMC. …

brain
US artificial intelligence market set to surge

The artificial intelligence market in the US is projected to grow at a CAGR of 75% until 2021 on account of increasing AI technology adoption, according to TechSci Research. …

Facebook
Privacy pitfalls of Facebook using your location to suggest friends

If you are a Facebook user and you haven’t guessed by now that it will sometimes suggest “friends” based on the fact that you happened to be at the same …

bomb
25,000-strong CCTV botnet used for crippling DDoS attacks

A DDoS attack against a jewelry shop website has lead researchers to the discovery of a CCTV botnet comprised of some 25,000 cameras from around the globe. The website had …

Android-rooting malware lurking on Google Play

For a while now Android-rooting malware has been creeping in Google’s Play store. The latest instance, discovered by Lookout researchers, masquerades as LevelDropper, an …

secure
Cyber threats today: Significant and diverse

Insider data theft and malware attacks top the list of the most significant concerns for enterprise security executives, according to Accenture. Of those surveyed, 69 percent …

Cloud Signature Consortium
Building a new open standard for cloud-based digital signatures

On July 1, 2016, a new European Union signature regulation (eIDAS) will go into effect, helping pave the way for global adoption of secure digital signatures. Aligned with …

UK map
UK banking customers targeted with Retefe Trojan with MitM capabilities

UK users are the latest targets of cyber crooks leveraging the Retefe banking Trojan and a rogue root certificate. The malware is out to steal online banking credentials of …

uber bugs
14 bugs in Uber’s assets revealed sensitive info about drivers, riders

Researchers from consulting and technological audit outfit Integrity have discovered 14 bugs in a variety of Uber’s websites and mobile apps, most of which could reveal …

NASCAR
NASCAR team falls victim to ransomware, pays ransom

Most US businesses would perhaps not pay in the event of a ransomware attack, but Circle-Sport Leavine Family Racing (CSLFR), a professional NASCAR car racing team, is not one …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools