Please turn on your JavaScript for this page to function normally.
Fake Adobe “licence key delivery” emails carry malware

A clever malware distribution campaign is currently doing rounds, taking the form of emails purportedly delivering licence keys for a number of Adobe’s software …

90-day spam campaign turns to Santa in December

Ninety days ago a substantial spam campaign focusing on dubious offers and fake prizes began, according to Commtouch. However since December 10, the campaign has been …

Federal agency cloud adoption increases 400%

Tripwire announced the results of a survey on cloud security technology trends in the federal government. The survey evaluated the attitudes of more than 100 federal …

Information security and compliance trends for the new year

Coalfire released its top five cybersecurity predictions for 2014. Rick Dakin, the company’s chief security strategist, consolidated an analysis from over 1,000 audits …

Bomb-threatening student caught because he used Tor on school Wi-Fi

20-year-old Harvard student Eldo Kim has been accused of sending fake bomb threats to Harvard University on Monday. What makes this case interesting is that he used the Tor …

MacBook webcam indicator light can be disabled to aid spying

Two researchers from Johns Hopkins University have proved, without a doubt, that it is possible to activate internal iSight webcams included in some legacy Apple machines …

OpenX / Revive Adserver zero-day actively exploited in the wild

A zero-day vulnerability that allows attackers to gain back-end access to popular open-source advertising server OpenX Source has been discovered by Florian Sander, founder of …

Obama panel advises big changes to NSA surveillance practices

The “independent” Review Group on Intelligence and Communications Technologies ordered to be created by US president Barack Obama in August has finally delivered …

Target breach affects millions who shopped at their stores

US retail giant Target is investigating a security breach that could turn out to be one of the biggest ever, involving compromised payment card information of millions of its …

Lead MEP presents preliminary conclusions on NSA inquiry

The European Parliament should consent to a trade deal with the US only if it makes no reference to data protection, says its Civil Liberties Committee in the preliminary …

Five resolutions to help IT pros get ready for 2014

IT and cybersecurity professionals should resolve now to gear up for accelerated change and complexity in 2014, especially in cybersecurity, data privacy and big data, says …

Useful password hashing: How to waste computing cycles with style

Password-based authentication is widely used today, despite problems with security and usability. To control the negative effects of some of these problems, best practice …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools