Google forks OpenSSL: BoringSSL will be used in company products
Google has announced another OpenSSL fork. Dubbed BoringSSL, it will, in time, replace the OpenSSL library in various Google’s projects. “We have used a number of …
Key Internet of Things privacy and security issues
Independently administered throughout 11 countries, a new Fortinet survey gives a global perspective about the Internet of Things, what security and privacy issues are in …
Spammers increasingly targeting Montreal
AdaptiveMobile released data that shows a marked increase in SMS spam across Canada in the past six months. The higher volume of SMS spam comes on the eve of the July 1st …
Quarter of all UK attacks target web services and applications
A comprehensive analysis of security alerts in 2013 reveals that a quarter of all attacks in the UK were application specific attacks or targeted at web applications. This is …
Cisco releases source code for experimental block cipher
A team of Cisco software engineers has created a new encryption scheme, and has released it to the public along with the caveat that this new block cypher is not ready for …
Week in review: GCHQ intercepts Google, Facebook users’ communications, Code Spaces destroyed by extortion hack attack
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Five great computer security tips that few people follow Here …
Critical flaw exposes admin passwords of nearly 32,000 servers
Over 30,000 servers with Supermicro baseboard management controllers (BMCs) on their motherboards are offering up administrator passwords to anyone who knowns where to look, …
TrueCrypt developer says forking the software is impossible
Even though a number of people have expressed interest in continuing the development of TrueCrypt, the future of these projects is questionable as one of the TrueCrypt …
Are your third-party vendors leaving the door open to hackers?
By now, every security professional in the world should know the story about Fazio Mechanical Services. The Pennsylvania-based company specializes in heating, air conditioning …
Demand for PaaS on the rise
A new age of Develop Your Own Application (DYOA) to meet ever-changing business requirements is driving demand for rapid application development Platform-as-a-Service (PaaS) …
Court decides bank is not to blame for $440k cybertheft
In many ways, small businesses are the perfect target for money hungry cyber crooks. Smaller companies are unlikely to have dedicated IT employees, making it less likely they …
Code hosting Code Spaces destroyed by extortion hack attack
Cloud code hosting service Code Spaces is forced to shut down, as a DDoS attack coupled with an unsuccessful extortion attempt was followed by the attacker deleting most of …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous