Please turn on your JavaScript for this page to function normally.
Hacking Team’s Flash 0-day exploit used against Korean targets before it was leaked

The Adobe Flash zero-day (CVE-2015-5119) exploit found in the Hacking Team’s leaked data has already been added to several exploit kits, but Trend Micro researchers have …

Risk management programs lack maturity, new strategies needed

With cyber attacks and data security threats looming at insecure access points, the increased scrutiny of regulators and the focused attention of boards of directors, the …

Bitglass granted patent on searchable cloud encryption

Bitglass has been granted a patent for its searchable full-strength 256-bit AES encryption for cloud applications. The technology, covered by US Patent 9,047,480, is …

Popular Android games unmasked as phishing tools

“ESET researchers have discovered a new, ingenious, yet very simple Facebook phishing scheme: playable Android games that, before they are started, ask users to enter …

Sophisticated, successful Morpho APT group is after corporate data

Two reports published on Wednesday by Symantec and Kaspersky Lab detail the recent attacks executed by an unusual APT group they have dubbed Morpho and Wild Neutron.The group …

Teenage Lizard Squad hacker found guilty of 50,700 charges

A 17-year-old member of the infamous Lizard Squad has been found guilty of 50,700 charges by a Finnish court, but won’t serve his sentence in a prison.Among other …

Security experts explain to US, UK governments why mandated encryption backdoors are a bad idea

Today, FBI director James Comey and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to address the US Senate Judiciary Committee …

Threat intelligence: Sources, sharing, utilization and the government

More than three quarters of IT security professionals (81%) believe the government should be sharing more threat intelligence information with the private sector, according to …

Flash 0-day exploit found in Hacking Team’s leaked data exploited by criminals

Human rights and privacy activists and journalists are actively reviewing the data stolen in the Hacking Team breach.Reporters of The Intercept have concentrated on going …

Hacking Team scrambling to limit damage brought on by explosive data leak

Who hacked Hacking Team, the Milan-based company selling intrusion and surveillance software to governments, law enforcement agencies and (as it turns out) companies? A hacker …

Flaw allows hijacking of professional surveillance AirLive cameras

Nahuel Riva, a research engineer from Core Security, discovered vulnerabilities in AirLive’s surveillance cameras designed for professional surveillance and security …

Fake Android battery monitor app thoroughly compromises users’ devices

“Downloading apps from Google Play is a safer proposition than doing it from third party markets, but despite Google using an automated app scanning service …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools