Please turn on your JavaScript for this page to function normally.
Vulnerabilities in security software leave users open to attacks

In most people’s minds, antivirus and security software equals better security. But thanks to security researchers who have taken it upon themselves to analyze some of …

The number of fingerprints stolen in OPM hack rose to 5.6 million

Once again, the scope of the breach at the US Office of Personnel Management has been amended: OPM’s press secretary Sam Schumach announced on Wednesday that “of …

CUJO: Plug-n-play protection for all devices

CUJO is a smart device that brings business level Internet security to guard all of your connected home devices. It’s simple to start with no installation necessary.You …

Healthcare industry sees 340% more security incidents than the average industry

Raytheon|Websense examined the current state of cyber threats and data-stealing attacks against an increasingly digital healthcare industry. Healthcare is highly-targeted and …

Free WordPress plugin for a password-free login

Nearly 25 percent of the Internet runs on WordPress, and now these sites can be more secure thanks to a free WordPress plugin available from LaunchKey.The plugin enables …

Chinese promotion company hijacks Android devices around the world

“A Chinese mobile app promotion company has created malicious adware that allows them to gain complete control of users’ Android devices. The company misuses this …

Apple tackles the XcodeGhost crisis by removing apps, alerting devs and users

“The XcodeGhost incident has demonstrated that however secure a system is thought to be, there’s always a way in. It also shows how the very human tendency of …

Using external URL shorteners for internal needs may lead to sensitive data leaks

Using external URL shortener services to create better-looking links to internal company documents, sensitive files and internal websites is a practice that company employees …

Killing computer infrastructures with a bang!

In an attempt to demonstrate how easy it would be for attackers to perform a high-voltage attack against a company’s computer infrastructure and take it down by damaging …

WD My Cloud NAS devices can be hijacked by attackers

Researchers with security consultancy VerSprite have unearthed several vulnerabilities in Western Digital’s My Cloud NAS product, which can be exploited by local and …

ENISA provides details on the complex cybersecurity exercise carried out in 2014

ENISA released the public version of the After Action Report of the pan-European cybersecurity exercise Cyber Europe 2014 (CE2014). This report, approved by the Member States, …

Firefox 41 includes critical security updates

Mozilla released Firefox 41.. This latest version comes with includes four critical, five high, nine moderate and one minor security update.Fixed in Firefox 41: 2015-114 …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools