Please turn on your JavaScript for this page to function normally.
CIA’s venture firm CISO offers singular solutions for cyber problems

In a eclectic keynote delivered to the Black Hat conference audience, Dan Geer, CISO at In-Q-Tel, made known his thoughts on and ideas about a number of things: from Internet …

Turla cyber-espionage campaign puzzle solved

Turla, also known as Snake or Uroburos is one of the most sophisticated ongoing cyber-espionage campaigns. When the first research on Turla/Snake/Uroburos was published, it …

Snowden allowed to stay in Russia for three more years

NSA whistleblower Edward Snowden has been permitted to stay in Russia for another three years, and is free to travel within the country and abroad, Russia Today reports. …

Prioritizing vulnerabilities to close gaps where it matters

Core Security announced the latest version of the Core Attack Intelligence Platform, which consolidates, prioritizes and validates the overwhelming quantity of vulnerabilities …

Google: Websites using HTTPS will get better search rankings

Websites that don’t use HTTPS will be ranked lower in Google Search results, the web giant has announced on Wednesday. “At Google I/O a few months ago, we called …

US DHS contractor gets hacked

USIS, the largest commercial provider of background investigations to the US federal government, has announced that it has suffered a breach that might have resulted in the …

Symantec issues update fixing Endpoint Protection zero-day

Symantec has issued updates for its Endpoint Protection solution that fix the zero-day escalation of privilege vulnerability recently discovered by Offensive Security …

Photo gallery: Black Hat USA 2014 Business Hall

The Black Hat conference is underway at the Mandalay Bay in Las Vegas, and the “business” part of the conference is bustling. Featured vendors and people: Qualys, …

SWSIS program awards cybersecurity scholarships to women

Responding to a shortage of cybersecurity professionals across the United States and a dearth of women in the field, Applied Computer Security Associates (ACSA) and the …

Deploying and monitoring honeypots made easy

At the Black Hat conference, LogRhythm released a new analytics suite that monitors honeypots to track would-be attackers, enabling customers to analyze nefarious tactics and …

US govt is after another secret document leaker

It seems that there is a leaker following in the footsteps of Edward Snowden, and US government officials are trying to discover his or her identity, as they confirmed for the …

92% of brands fail email security test

The Online Trust Alliance (OTA), the non-profit with the mission to enhance online trust and empower users, announced the results of its 2014 Email Integrity Audit report, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools