Please turn on your JavaScript for this page to function normally.
DARPA’s Cyber Grand Challenge offers $3.75 million in prizes

Computer security experts from academia, industry and the larger security community have organized themselves into more than 30 teams to compete in DARPA’s Cyber Grand …

More developers looking to keep TrueCrypt alive

The news that the developers of TrueCrypt have abandoned the popular software has hit the security community like a ton of bricks, but there is apparently no lack of people …

Beware of emails offering bogus HeartBleed removal tool

Malware peddlers are taking advantage of the fact that the existence of the Heartbleed bug has breached the confines of the cyber security world and has entered the awareness …

The disruption of Cryptolocker and GameoverZeus

Part of the difficulty in unraveling ZeuS botnet infrastructure is mapping it out. Attackers usually plant a generic dropper within an emailed file, disguised to look like a …

Opportunities and challenges for CIOs in different industries

CIOs around the globe may share common concerns, but there are considerable differences in their priorities, according to a global survey of CIOs by Gartner, Inc.’s …

Molerats attacks continue targeting US, EU, Middle East organizations

Not all RAT-wielding attackers come from China, say FireEye researchers. For over a year they have been following the activities of a group of hackers that uses the Poison Ivy …

Cupid exploits Heartbleed bug on WiFi networks and Android

Nearly two months have passed since the public revelation of the Heartbleed bug affecting the widely used open source cryptographic library OpenSSL. The reaction of the …

NSA collects photos to feed facial recognition programs

The NSA has been collecting photos of people’s faces at the tune of 55,000 images every day, and has been feeding the images into its facial recognition programs, James …

International action against Gameover Zeus botnet and CyptoLocker ransomware

On Friday, 30 May 2014, law enforcement agencies from across the world, supported by the European Cybercrime Centre (EC3) at Europol, joined forces in a coordinated action led …

Why endpoint backup is critical

Enterprises are at an increasing risk for data loss due to the growing amount of company data stored on endpoints—the laptops, smartphones, tablets and other devices which …

Open Crypt Audit Project considers taking over development of TrueCrypt

The unexpected notice saying TrueCrypt isn’t safe, which has apparently been posted last week by the developers of the software, took the security community by surprise …

Introducing the Security Culture Summer School

The infosec community has complained about awareness training failures and wasting time and effort on awareness trainings for quite some time. A consensus has emerged that for …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools