NYU launches largest cyber security student contests
Even before the academic semester starts, students from across the globe have begun registering for the largest set of student cyber security competitions in the world: the …
Researchers exploit flaw to tie Secret users to their secrets
The secrets you share on Secret, the popular app that allows people to share messages anonymously within their circle of friends, friends of friends, and publicly, can be …
Kelihos botmasters target Russian patriots to expand botnet
The cyber crooks behind the Kelihos botnet are, once again, trying to swell the number of computers included in it. They are trying a novel approach: posing as a …
Sony PSN back online after DDoS attack
Sony’s PlayStation Network has been hit with and downed by a large DDoS attack this weekend, but is now back online a functioning as it should. “Like other major …
Tool restores SynoLocker-encrypted files
Security company F-Secure has created a tool that could help SynoLocker victims get their files back, but it only works if they have received – bought – the …
Over 1,000 businesses compromised with Backoff malware
The US Department of Homeland Security has once again issued a warning to businesses about the Backoff malware. “The DHS encourages organizations, regardless of size, to …
8 ways to talk security with executive management
The importance of information security and technology risk management continues to grow, but many risk and security professionals continue to struggle with non-IT executive …
Identity theft vendor sentenced to 100 months in prison
A northern California man who served as an information and document vendor in the identity theft and credit card fraud ring known as Carder.su was sentenced yesterday to serve …
D-Link releases DWL-8610AP Wi-Fi AP with security features
D-Link announced the DWL-8610AP, a new high power, 802.11ac unified wireless access point. Rich with advanced radio management and security features, it allows IT …
Week in review: Securing networks in the IoT era, and taking control of Android app permissions
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Breaking the security of physical devices In this podcast …
Bitcoin-themed phishing campaign creates quite a stir
The latest massive email phishing campaign targeting Bitcoin users has had an unexpected click-through rate. The spam campaign came in two waves, and of the 12,000 messages …
Sneak attack through smartphone shared memory
A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades