Please turn on your JavaScript for this page to function normally.
What are the most effective means for achieving IT ops excellence?

Based on results collected across a variety of industry verticals – including financial services, healthcare, manufacturing, and retail – Continuity …

Triggering deep vulnerabilities using symbolic execution

Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic values to evaluate a large set of parallel program paths …

Deadly new ransomware soon to be released?

As disruptive as Cryptolocker is, there’s a possibility that an even deadlier type of ransomware will soon be targeting unsuspecting users. White-hat security research …

Multi-protocol SoftEther VPN becomes open source

In March 2013, a Japanese student by the name of Daiyuu Nobori set up VPN Gate, a free VPN service that he hoped would be used by Internet users who wish to avoid their …

Palo Alto Networks acquires Morta Security

Palo Alto Networks has acquired Morta Security, a Silicon Valley-based cybersecurity company operating in stealth mode since 2012. Financial terms of the acquisition were not …

Stealing money from ATMs with malware

This talk from the 30th Chaos Communication Congress will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The …

Microsoft releases BYOD best practices for enterprise workers

Microsoft is releasing best practices for enterprise workers who are considering using their personal technology device for work and play. This business trend, known as BYOD, …

New Linksys 802.11AC WRT router allows open source customization

Linksys is bringing back the heritage of the best-selling router of all time – the Linksys WRT54G but updated and modernized it with the most leading edge available …

SanDisk releases 64GB wireless flash drive

SanDisk announced the 64GB SanDisk Connect Wireless Flash Drive. In addition, recently released software updates enhance the performance and functionality of both the SanDisk …

“Unauthorized activity on your Amazon account” phishing email doing rounds

The pre-holiday online shopping frenzy has ended, but scam and phishing attempts continue unabated. The latest email spam campaign aiming for login credentials is one that …

How to make malware warnings more effective?

An effective security warning is concrete and clear, appeals to authority, and doesn’t pop up too often, say the results of a study into the psychology of malware …

WoW gamers targeted with trojanized Curse client

The DDoS attacks that temporarily took down Blizzard’s Battle.net and Valve’s Steam online gaming services over the end of the year holidays have undoubtedly …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools