Please turn on your JavaScript for this page to function normally.
money
Calculate the cost and probability of a DDoS attack

DDoS attacks are becoming increasingly larger, more complex, and perpetrated by cyber extortionist instead of hacktivists and vandals, according to a recent survey from Arbor …

usa passport
US passport and visa database open to intrusion?

The Consular Consolidated Database (CCD), which contains over 290 million passport-related records, 184 million visa records, and 25 million records on US citizens living …

authentication
Global IAM market to reach 24.55 billion by 2022

The global identity and access management (IAM) market is expected to reach USD 24.55 billion by 2022, according to Research and Markets. Increased spending by large scale …

world in hand
Week in review: Hackers breaching law firms, ransomware flare-up, and how to get your talk accepted at Black Hat

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Hackers breaching law firms for insider trading info Two of the most …

Security
PHP, Python still fail to spot revoked TLS certificates

In 2012, a group of researchers demonstrated that SSL certificate validation is broken in many applications and libraries, and pointed out the root causes for that situation: …

reddit
Has Reddit been served with a National Security Letter?

Reddit has published its 2015 Transparency Report, and there is one thing missing from it: the entire section about national security requests. The same report for 2014 …

Red door
Flaw in HID door controllers lets attackers unlock doors, deactivate alarms

Trend Micro researcher Ricky Lawshae has unearthed a critical vulnerability in HID’s VertX and Edge door controllers. Exploiting the flaw is easy, and could result in …

Anomali threat intelligence
Why SMBs need threat intelligence

Most of the innovative work being done in information security comes from to small to medium sized companies. At the same time, there’s a lack of security solutions for …

target
SMEs under attack, security readiness still low

When it comes to securing their data, SMEs remain several steps behind their larger counterparts. Some reasons for the disparity in security readiness may be that SMEs have …

samas-ransomware
Samas ransomware enters hospitals through vulnerable servers

There’s hardly a day anymore that we don’t hear about a hospital being hit with ransomware. But while most have been infected via phishing emails carrying or …

iPhone
SideStepper vulnerability can be used to install malicious apps on iOS

Check Point researchers have identified SideStepper, a vulnerability that can be used to install malicious apps on iPhones and iPads to steal login credentials and sensitive …

Law legislation
Hackers breaching law firms for insider trading info

Two of the most prestigious law firms in the US, best known for their financial services and corporate practices, have had their computer networks compromised by hackers. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools