Please turn on your JavaScript for this page to function normally.
Serious flaws in cell phone carrier control software found

At the Black Hat conference this week, two Accuvant researchers have disclosed serious security flaws in the carrier control software used in over 2 billion cellular devices …

End-to-end encryption hardware for unsecure networks

x.o.ware has debuted the ExoNetTM VPEx Gateway and its companion product, the ExoKey Secure Communications Extension, this week at Black Hat USA 2014. These two new products, …

Mocana offers an alternative to OpenSSL on Apache web servers

At the Black Hat USA 2014 conference, Mocana debuted its enterprise-grade NorthStar secure connectivity solution for Apache web servers, a highly secure, drop-in replacement …

Unified solution for dynamic mitigation of cyberattacks

At Black Hat USA 2014, ForeScout Technologies, provider of pervasive network security solutions for Global 2000 enterprises and government organizations, and ThreatStream, a …

Five steps to take to protect your passwords

A report issued this week claimed that a Russian cybercrime group stole 1.2 billion usernames and passwords from 420,000 websites. While some security experts question the …

Gemalto to acquire SafeNet

Gemalto has signed a definitive agreement to acquire 100% of the share capital of SafeNet, a worldwide leader in data protection and software monetization, from Vector Capital …

Yahoo will offer end-to-end mail encryption by 2015

Since the beginning of this year, Yahoo has had several good news for its customers: Yahoo Mail got HTTPS on by default, and the company began encrypting all the traffic …

Critical bug in WordPress plugin allows site hijacking

A popular WordPress plugin that allows site owners to easily customize the contact form has a critical vulnerability that can be exploited to download and remotely modify the …

Oracle introduces vault for encryption keys, wallet files

Encryption is widely recognized as the gold standard for protecting data privacy, but encryption is only as strong as its key management. Critical credential files such as …

Photo gallery: A walk through Black Hat’s Business Hall

This gallery from Black Hat features: Qualys, Blue Coat Systems, FireEye, Shape Security, Michael Schrenk, Gigamon, Securonix, ThreatTrack Security.

Free Android app identifies and uninstalls spyware

At Black Hat, SnoopWall announced the release of Privacy App for Android platform mobile devices. Privacy App is based upon the company’s counterveillance technology. It …

Two Gameover Zeus variants targeting Europe and beyond

Bitdefender has identified two Gameover Zeus variants in the wild: one of them generates 1,000 domains per day and the other generates 10,000 per day. The UK is currently the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools