Please turn on your JavaScript for this page to function normally.
Poweliks malware creates no files, lays low in the registry

For most malware, performing their malicious task(s) is the primary goal, and a close second is to stay unnoticed on the system for as long as possible. As developers of …

NIST asks for comments on security guide for federal information systems

The National Institute of Standards and Technology (NIST) has issued for public comment a draft update of its primary guide to assessing the security and privacy controls that …

China bans Symantec, Kaspersky software from govt systems

Symantec and Kaspersky Lab have become the latest victims of Chinese government’s procurement agency’s axe as the two firms have been dropped from the approved …

New game sharpens secure coding skills

Today at Black Hat, Checkmarx launched Game of Hacks, a challenging game for software developers and security professionals to test their application hacking skills, improve …

Synology NAS users hit with Cryptolocker variant

You know that your products are getting to be very popular when cybercriminals target users with a customized version of the Cryptolocker ransomware. The products in question …

Thousands of Mozilla developers’ emails, passwords exposed

Email addresses and encrypted passwords of tens of thousands of Mozilla developers were accidentally exposed and might have been harvested by malicious individuals, Stormy …

Week in review: Malicious USB device firmware, insecure IoT devices, and using Hollywood to improve your security program

Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: What influences corporate security strategies? Sixty eight …

Competition to crack a virtual terrorist HDD, break into CCTV systems

Sophos is calling amateur security talent to turn sleuth and to investigate confiscated crime scene computer systems belonging to a cyber terrorist group as part of the latest …

Retailers warned of attacks using hard-to-spot PoS malware

Retailers, beware: cyber crooks are increasingly targeting remote desktop applications by brute-forcing passwords, and are using that access to plant hard-to-detect PoS …

CIA chief admits agency employees hacked Senate computers

CIA Director John Brennan has confirmed that five CIA employees have, indeed, “improperly accessed” computers of Senate staffers and the computer network that was …

Reactions to the Paddy Power data breach

Paddy Power is contacting 649,055 customers in relation to a data breach from 2010. The historical dataset contained individual customer’s name, username, address, email …

Microsoft releases EMET 5.0

Microsoft has released version 5.0 of its Enhanced Mitigation Experience Toolkit (EMET), a free utility that uses a number of security mitigation techniques to prevent the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools