Please turn on your JavaScript for this page to function normally.
W3C to make payments easier and more secure

The World Wide Web Consortium (W3C) launched the Web Payments Working Group to help streamline the online “check-out” process and make payments easier and more …

SHA-2 encryption will make many sites inaccessible to users who can’t afford newer tech

A group of security researchers has recently announced that it’s highly likely that effective collision attacks that would break SHA-1 encryption will be revealed by the …

TalkTalk breach: Attackers demand £80,000 for stolen data

UK Telecom TalkTalk revealed on Friday that its website has suffered an attack, that it has been taken down as a precaution, and that names, addresses, dates of birth, email …

Cloud-based vulnerability management: Top vendors in the field

With an increasingly fast-paced threat landscape threatening even the most complex network security infrastructures, vulnerability management has become essential.Many vendors …

Nine arrested in UK investigation of criminal network defrauding bank customers

Detectives investigating an organized criminal network responsible for defrauding bank customers across the UK out of approximately £60 million have arrested nine …

Week in review: Criminals hacked chip-and-PIN system, secret code in printers allows tracking, and insecure WD self-encrypting hard drives

Here’s an overview of some of last week’s most interesting news and articles:Criminals hacked chip-and-PIN system by perfecting researchers’ PoC attackWhen …

CCTV botnets proliferate due to unchanged default factory credentials

Incapsula researchers have uncovered a botnet consisting of some 9,000 CCTV cameras located around the world, which was being used to target, among others, one of the …

Data of 4 million TalkTalk customers likely stolen in wake of website attack

TalkTalk, one of UK’s biggest telecoms, has suffered a “significant and sustained cyberattack” on their website, and it’s possible that personal and …

Microsoft wants researchers to find bugs in .NET Core and ASP.NET, will pay

Microsoft has launched another specialized bug bounty that’s set to run until January 20th, 2016.Bug hunters, who can earn between $500 and $15,000 depending on the …

Smart home security and privacy checklist

Today’s homes are being built and retrofitted with smart apps and devices to monitor things like security, temperature and lighting. Homeowners and renters should be cognizant …

12 new malware strains discovered each minute

G DATA researchers discovered a 64.8 percent spike of new malware strains as compared to the first half of 2014. This averages out to 12 new strains per minute. In all, the …

Four things to know about new net neutrality rules

Net neutrality is crucial to the future development of the Internet. It is the principle that all online traffic should be treated equally, regardless of the type of content …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools