CERN, MIT scientists launch Swiss-based secure webmail
Last week marked the beta release of yet another encrypted, secure email service, and interest for it was so overwhelming that its developers had to temporarily close the …
Sophisticated Google Drive phishing campaign persists
Symantec researchers are once again warning about a sophisticated and persistent phishing campaign targeting Google users. The victims are hit with fake emails sporting a …
Still no patch for 7-month-old IE8 zero-day flaw
HP’s Zero Day Initiative has published details about a zero-day vulnerability affecting Microsoft Internet Explorer 8 which the Redmond giant apparently has no intention …
OnionShare lets you send files securely and anonymously
A new programming project that allows users to send files anonymously over Tor has been made available on GitHub by its author Micah Lee, former staff technologist at the EFF …
PayPal fixes merchant account hijacking bug
Well-known and prolific bug hunter Mark Litchfield has unearthed a pretty big flaw in PayPal Manager, which would allow attackers to hijack a merchants’ account by …
What are the biggest risks with the Internet of Things?
The majority of small businesses in the U.S. (82 percent) believe the Internet of Things (IoT) will bring fresh opportunities for their business, according to a new study …
Reactions to the eBay breach
A database containing eBay customers’ name, encrypted password, email address, physical address, phone number and date of birth was compromised. Here are some of the …
More enterprises to adopt multi-factor authentication
Rising security risks, and demand for seamless and secure access across any device, anytime, has triggered greater adoption of authentication solutions. A new SafeNet survey …
Hybrid cloud computing success factors
In the past three years, private cloud computing has moved from an aspiration to a tentative reality for nearly half of the world’s large organizations. Hybrid cloud …
Company and employee disconnect on BYOD security policies
Many employees do not take adequate steps to protect company information, a weakness that could result in critical security breakdowns, according to Webroot. Key findings: …
Stop all browser-borne malware from entering your network
In this podcast, recorded at Infosecurity Europe 2014, Branden Spikes, CEO, CTO & Founder of Spikes Security, talks about how malware has already done its job by the time …
AT&T hacker wants US govt to pay for the time he spent in prison
In an open letter addressed to members of the New Jersey District Court, FBI, and DOJ, Andrew “weev” Auernheimer is seeking monetary restitution for the time he …