Please turn on your JavaScript for this page to function normally.
Silk Road 2.0 goes online

As announced by well-known Silk Road user named “The Godfather”, who has been doing business on the infamous underground market for the last few years, another …

Free eBook: 9 Steps to Cybersecurity

9 Steps to Cybersecurity from expert Dejan Kosutic is a free e-book designed specifically to take you through cybersecurity basics. Aimed at people with limited prior …

Microsoft and Facebook start Internet-wide bug bounty program

Dubbed The Internet Bug Bounty, it is sponsored by the two Internet giants and is aimed at anyone who discovers vulnerabilities in a series of open source programming …

PCI DSS 3.0 is now available

Today the PCI Security Standards Council (PCI SSC) published version 3.0 of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS). …

Another Android “master key” bug revealed

The existence of another “master key” bug that can be used to push malware onto Android users has been publicly disclosed by Jay Freeman (a.k.a Saurik), the …

Cybercriminals opting for real-time malware campaigns and phishing

The third quarter of 2013 saw further use of real-time malware campaigns and a dramatic increase in phishing sites, according to Commtouch. The ever-growing exploitation of …

Svpeng Android banking Trojan goes phishing

The Android banking Trojan known as Svpeng has been improved by its creators and is now capable to perform phishing attacks as well as stealing money directly from a …

Cybercrime gangs seek victims in untapped markets

A record number of brands were targeted by phishers in the second quarter of 2013, according to APWG. A total of 639 unique brands were targeted by phishing attacks in the …

Employees stuck with unauthorized file sharing services

Most employees (81%) access work documents on the go. Yet in the absence of an enterprise-grade file sharing alternative, 72% are resorting to unauthorized, free file-sharing …

Red Hat delivers cloud management for OpenStack

Red Hat announced the next release of its cloud management platform, Red Hat CloudForms 3.0. CloudForms already provided essential enterprise-level management and automation …

TrueCrypt to go through a crowdfunded, public security audit

After all the revelations about NSA’s spying efforts, and especially after the disclosure of details about its Bullrun program aimed at subverting encryption standards …

Malware peddlers testing new infection techniques

An ongoing malicious spam campaign impersonating UPS has shown that malware peddlers are experimenting with different approaches for infecting hapless users, and additional …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools