Pirate activist shows politicians what digital surveillance looks like
How to make politicians really understand the dangers of mass digital surveillance and the importance of information security? Gustav Nipe, the 26-year old president of the …
Open source tool trawls Github repositories for sensitive data
Michael Henriksen, a member of the SoundCloud security team, has been recently tasked with creating a system that will constantly check the company’s GitHub …
WhatsApp sees increasing complexity of spam campaigns
Over the past few months, AdaptiveMobile has tracked an increase of spam complexity on messaging apps, such as WhatsApp, in the United States, Europe and India, and expects …
Encrypted messaging and file storage app Peerio goes open beta
Canada-base Peerio has released the beta version of an app of the same name which combines secure messaging, file sharing and storage, and adds encryption to it. Peerio is …
Five key security, identity and access management trends
CA Technologies announced five key trends for security and identity and access management (IAM) that will impact organizations and security professionals in 2015 as they …
Unlock your digital world with True Key
Intel Security recently previewed True Key, a new way to unlock your digital world. It combines both password management with simple and secure multi-factor …
New version of Cryptowall ransomware spotted doing rounds
The infamous Cryptowall ransomware is back: the newest version has been spotted compromising users starting on January 12. According to both Microsoft and the researcher that …
Beware of malware masquerading as Oracle security patches
Oracle is warning users about malware sites actively offering Oracle patches for download. “It has come to our attention that there are non-Oracle sites offering Oracle …
Skeleton Key malware makes all passwords valid
Researchers from the Dell Secureworks CTU team have unearthed a new type of malware whose goal is to allow attackers to bypass authentication on Active Directory (AD) systems …
Reactions to David Cameron’s plan to ban end-to-end encryption
On Tuesday, British Prime Minister David Cameron announced his plan to introduce new surveillance powers in the UK, and ban applications that use end-to-end encryption. Here …
January’s Patch Tuesday marks the start of a new era
Microsoft’s January 2015 patch Tuesday marks the start of a new era. It seems that Microsoft’s trend towards openness in security has reversed and the company that …
Cyber attacks demonstrated on autonomous ground vehicles
Mission Secure Inc. (MSi), a cyber defense technology and solutions provider, and Perrone Robotics Inc. (PRI), a provider of robotic and autonomous ground vehicle solutions, …
Featured news
Resources
Don't miss
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works