Please turn on your JavaScript for this page to function normally.
Which malware lures work best?

“More often than not, malware peddlers’ main goal is to deliver their malicious wares to the maximum number of users possible. Choosing the right lure is crucial …

If we want strong encryption, we’ll have to fight for it

As digital rights lawyer and special counsel to the Electronic Frontier Foundation Marcia Hofmann correctly noted in her keynote at Hack in the Box Amsterdam 2015 on Thursday, …

Exposing the vulnerabilities in Oracle PeopleSoft applications

During his talk at the Hack in the Box conference, Alexey Tyurin, Head of the Oracle Security Department at ERPScan, spotlighted several vulnerabilities in Oracle PeopleSoft …

Cybersecurity strategies and the boardroom

Cybersecurity has clearly become an important board-level priority. In fact, more than 80 percent of respondents to a NYSE Governance Services/Veracode survey reported that …

Complex security solutions are exposing companies to risk

Companies are putting their customers’ data at risk because IT teams do not have the expertise or time to deploy today’s complicated IT security products, a new survey from …

Phishers register domain names, hammer traditional targets

The number of domain names used for phishing reached an all-time high, according to a new report by the the Anti-Phishing Working Group (APWG). Many of these were registered …

Total cost of average data breach reaches $3.8 million

The average consolidated total cost of a data breach is $3.8 million, according to a Ponemon Institute study of 350 companies spanning 11 countries.The study also found that …

Reactions to the IRS hack that impacted 100,000 people

Cybercriminals were able to successfully steal tax forms full of personal information of more than 100,000 taxpayers through IRS’ Get Transcript application. This data …

Solving the cybersecurity challenges of smart cities

Backed by leading IT security researchers, companies and organizations, including IOActive, Kaspersky Lab, Bastille, and the Cloud Security Alliance, the global Securing Smart …

Researchers track Android users by collecting accelerator readings

A group of researchers from Nanjing University, China, have demonstrated that Android users’ movements can be tracked by simply analyzing the data provided by the …

Massive campaign uses router exploit kit to change routers’ DNS servers

Well-known security researcher Kafeine has spotted an active campaign aimed at compromising SOHO routers and changing their DNS settings so that the attackers can seamlessly …

15,000 spam emails have hit the inboxes of Android users in recent days

“Thousands of Android users are at risk of having their mobile devices and private contents locked by a particularly ruthless ransomware that demands $500 to restore …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools