Please turn on your JavaScript for this page to function normally.
Apple patches Safari arbitrary code execution vulnerabilities

Apple released new versions of their Safari browser – 6.1.6 and 7.0.6 – in which they fixed multiple memory corruption problems in Webkit. Out of the seven …

ZeroLocker ransomware “helps” you get your files back

In early June, the FBI has lead a rather successful multi-national effort to disrupt the GameOver Zeus botnet which was also responsible for delivering Cryptolocker. …

Beware of fake “Gmail suspicious login” warnings

Malicious emails impersonating Gmail Account Services have been spotted hitting inboxes around the world, falsely claiming that the users’ Gmail account has been logged …

Google starts warning users about deceptive downloads

Google has announced a welcome change to its Safe Browsing service: starting next week, Google Chrome will also warn users about attempts to make them download software that …

Infographic: Honeypot cloud security data

New infographic data on hackers reveals that Russia stealing passwords is the least of our cyber worries. Recent data reveals that China and India are attacking U.S. servers …

US defense contractors still waiting for breach notification rules

US Department of Defense contractors will have to wait until September 24 to see what specific rules they will be required to follow when it comes to the reporting of computer …

SynoLocker gang planning to move on?

The crooks behind SynoLocker have made some changes to the website sporting the payment instructions. They are trying to spur more victims to pay up by saying that the website …

86% of hackers don’t worry about repercussions

Thycotic announced the results of a survey of 127 self-identified hackers at Black Hat USA 2014. The survey found that 86% of hackers are confident they will never face …

Fake Tor Project website delivers malware instead of anonymity

A computer science student has discovered an almost perfect copy of The Tor Project’s website, offering malware for download instead of the Tor Browser Bundle and …

Disqus WordPress plugin vulnerabilities

During a penetration testing for a client, Australian based independent security consultant Nik Cubrilovic, discovered a couple of security issues within the very popular …

IT has no choice but to embrace BYOD

Bring-Your-Own-Device (BYOD) and Bring-Your-Own-App (BYOA) trends started as a clandestine effort by employees to work more efficiently and grew rapidly. Since they …

Encore Networks launches ultra-low cost wireless VPN router

Encore Networks launched the EN-2000, an ultra-low cost wireless VPN router designed for high-availability M2M applications in fixed or portable locations supporting video …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools