Please turn on your JavaScript for this page to function normally.
Microsoft widens pool of submitters to its bug bounty programs

Microsoft might have been a late starter when it comes to bug bounties, but they are continually making changes aimed at making its bug bounty program as accessible, as …

The dangers of weakening cybersecurity to facilitate surveillance

In response to the controversy over the alleged surveillance practices of the NSA, the White House established the Review Group on Intelligence and Communication Technologies, …

Triumfant detects and stops in-memory malware attacks

Advanced Volatile Threats are malware attacks that take place in a computer’s RAM or other volatile memory, and are difficult to detect because they are never stored to …

Google tests new Chrome feature for thwarting rogue plugins

A new feature that has been added to Google Canary is set to help users remove changes effected by malware that switches their homepage or injects ads into the sites their …

Cryptolocker crooks offer victims a second chance

The criminals behind Cryptolocker, the destructive ransomware that has lately been targeting mostly US and UK PC users, are trying to earn more money by offering users who …

New healthcare security and privacy certification from (ISC)2

(ISC)2 has launched a new certification, the HealthCare Information Security and Privacy Practitioner (HCISPPSM), the first foundational global standard for assessing both …

US agency employees let invented woman expert into the network

Once again, and more spectacularly, security researchers have proved that attackers wielding a fake LinkedIn account sporting the image of an attractive woman claiming to be …

Fake LinkedIn profile gathering info for targeted attacks

Social networks are great sources of information for cyber criminals and a great way to enter the potential victims’ circle of trust. An ongoing social engineering …

Most organizations unafraid of phishing

ThreatSim released its 2013 State of the Phish Awareness Index, gauging phishing training, awareness and readiness among 300 IT executives, administrators and professionals in …

ENISA issues recommendations for securing data using cryptography

ENISA, the European Union’s “cyber security” Agency, launched a report recommending that all authorities should better promote cryptographic measure to …

Twitter abuse trends and stats

When it comes to Twitter, people still have a large appetite for having a large number of fake followers in order to seem more popular. Fraudsters are cashing in on this in a …

CoverMe: Private texting, sharing and secure phone calls app

CoverMe, a secure texting, document sharing and phone call app, launched today after a beta period. Features include: Make free secure phone calls Send self-destructing …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools