HTTPS can’t be trusted to obscure private online activity
HTTPS was initially used to prove to Internet users that the website and web server with which they are communicating are indeed the ones they want to communicate with, but …
Cybercriminals increasingly drawn to Tor anonymity and hidden services
Initially created to help political dissidents bypass traffic restrictions and hide their online activity from authoritarian governments, the Tor anonymity network has long …
A peek into China’s burgeoning mobile cybercriminal underground
Every country’s cybercriminal underground market has distinct characteristics, and with 500 million national mobile Internet users and the number continuously rising, …
New technique targets C code to spot malware attacks
Researchers from North Carolina State University have developed a new tool to detect and contain malware that attempts root exploits in Android devices. The tool improves on …
Cybersecurity concerns becoming a boardroom issue
The increasing frequency, sophistication, and business impact of cyber-attacks have pushed cybersecurity planning and protection from an operational concern of IT departments …
Microsoft’s quest to make users drop Windows XP continues
As the date of the scheduled retirement of Windows XP – arguably one of Microsoft’s most popular products ever – draws near, the company continues its quest …
Major gaps found in the governance of emerging technologies
SailPoint published an infographic which outlines recent research results that indicate that while global enterprises are embracing – and in some instances mandating …
GnuTLS library flaw opens way for MitM attacks
A critical cryptographic bug similar to the one recently discovered in iOS and OS X has been revealed to exist in the GnuTLS code library, widely used in open source software …
New Android devices sold with pre-installed malware
A wide range of smartphones and tablets manufactured by Samsung, Motorola, Asus and LG Electronics have apparently been compromised with malicious apps before being sold to …
Cryptocat now available for iPhone
Cryptocat, the popular open source application that enables users to chat online easily and securely, is now available for iPhone users (on Apple’s App Store), as well. …
73% of companies are unprepared for disaster recovery
The Disaster Recovery Preparedness (DRP) Council announced findings from its benchmark study which show that 73% of respondent organizations worldwide are not taking adequate …
More Bitcoin thefts, Bitcoin bank Flexcoin shuts down
Mere days after Mt. Gox filed for bankruptcy, “Bitcoin bank” Flexcoin and Bitcoin exchange Poloniex have announced that they have been successfully targeted by …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform