Please turn on your JavaScript for this page to function normally.
Data breaches and bots are driving cybercrime surge

From July to September, ThreatMetrix detected more than 90 million attempted attacks across industries, representing a 20 percent increase over the previous quarter. This …

Factors that influence breach costs

A variety of both positive and negative factors influence the expenses organizations incur as a result of breach, according to the SANS Institute. A lot of it depends on their …

Database of 70 million prisoner phone calls breached, leaked

A vast collection containing metadata of over 70 million records of phone calls placed by prisoners to at least 37 US states and links to actual recordings for each call has …

Researchers hack Vizio Smart TVs to access home network

Not only do Vizio’s Smart TVs track users’ viewing habits by default (and that information is sold to third parties who can then use it to deliver targeted ads to …

The automation and industrialization of cyber attacks

A new Imperva report highlights cyber criminals’ use of automation to increase both the magnitude and velocity of attacks designed to compromise users and steal sensitive …

Tor Project claims FBI paid university researchers $1m to unmask Tor users

Have Carnegie Mellon University researchers been paid by the FBI to unmask a subset of Tor users so that the agents could discover who operated Silk Road 2.0 and other …

Endpoint security lags in spite of vulnerabilities

Endpoint security solutions today continue to lag, failing to provide adequate protection or detection against today’s security threats, according to Promisec. Survey results …

Buhtrap gang distributes malware through Ammyy’s remote desktop software

ESET has uncovered several examples of malware being distributed via a strategic web compromise. Recently, visitors to ammyy.com were offered a bundle containing not only the …

Digitally signed spam campaign spotted delivering malware

We’ve all heard about digitally signed malware, but have you ever been targeted with a digitally signed spam email? Someone did, and has shared the signature notice with …

Rooted, Trojan-infected Android tablets sold on Amazon

If you want to buy a cheap Android-powered tablet, and you’re searching for it on Amazon, the best thing you can do is carefully read all the negative reviews you can …

Ivan Ristic, SSL Labs
Ivan Ristic and SSL Labs: How one man changed the way we understand SSL

Ivan Ristic is well-known in the information security world, and his name has become almost a synonym for SSL Labs, a project he started in early 2009. Before that, he was …

Three indicted in largest theft of customer data from a U.S. financial institution in history

On Tuesday, federal prosecutors unsealed a superseding indictment charging Gery Shalon, Joshua Samuel Aaron and Ziv Orenstein with orchestrating massive computer hacking …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools