Please turn on your JavaScript for this page to function normally.
The top 7 improvements in Nmap 7

Nmap 7 is the product of three and a half years of work, nearly 3200 code commits, and more than a dozen point releases since the big Nmap 6 release in May 2012.The top 7 …

Users find backdoors to do their job

Balabit unveiled the results of its pan-European survey into the current state of IT security. The survey looked at how organisations balance IT security and business …

Week in review: Mainframe security, cross-device tracking, and how online fraud will evolve in 2016

Here’s an overview of some of last week’s most interesting news, interviews and articles:Android adware tricks users into giving it power to secretly download …

ISIS operation security guide gives insight into group’s cybersecurity practices

Do ISIS terrorists use encryption, and if so, what tools do they favour?The Combating Terrorism Centre (CTC), an academic institution at the US Military Academy in West Point, …

Android adware tricks users into giving it power to secretly download other apps

Earlier this month Lookout revealed the existence of three adware families – Shuanet, ShiftyBug and Shedun – that secretly root Android devices and are extremely …

New Dyre variant can target Windows 10 and Microsoft Edge users

As Microsoft continues to push Windows users towards adopting the latest version of the popular OS, malware authors have started adding support for it. Heimdal Security …

PwnBin: A script for scraping Pastebin for leaked API keys, SSH credentials

Pastebins, apart from being a great help for programmers as they offer a place where one can store text online for a set period of time and share it with others, are also …

How online fraud will evolve in 2016

While 2015 is drawing to a close, the security fraud community is preparing for more battles ahead in 2016. And next year, consumer-facing web and mobile apps are up against a …

40% of companies expect a data breach next year

Clearswift released their annual Clearswift Insider Threat Index (CITI) exploring why firms have been slow to address internal security threats and including data from …

Threat and vulnerability management market revenue to reach $5.3 billion

Data trends show that the global threat and Vulnerability Management (VM) market is expected to grow from US$5.3 billion in 2015 to $8.6 billion in 2020, according to ABI …

FTC amends telemarketing rule to ban payment methods used by scammers

The Federal Trade Commission has approved final amendments to its Telemarketing Sales Rule (TSR), including a change that will help protect consumers from fraud by prohibiting …

University implies they helped FBI break Tor protection because of a subpoena

Carnegie Mellon University has finally issued a statement commenting on the recent accusations that their researchers have aided the FBI to unmask a subset of Tor users …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools