Please turn on your JavaScript for this page to function normally.
Counterfeit money detector easily hacked to accept fake money

A lot of simple electronic devices that we use every day can be easily hacked, because security has for a long time been at the very bottom of the list of things to care about …

Sophos delivers cloud-based endpoint security

Sophos announced Sophos Cloud, an easy to use security service that provides essential protection for today’s advanced threats. This first version of Sophos Cloud …

Russia handed malware-laden devices to G20 delegates?

At the G20 summit held near St. Petersburg in September, attending delegates representing the 20 most powerful nations in the world have been handed gifts that included …

Microsoft details risks of running unsupported software

Microsoft published their Security Intelligence Report (SIR) volume 15, which analyzes threat intelligence from more than 1 billion systems worldwide to provide in-depth …

Obama orders NSA to stop spying on UN diplomats

There is nothing wrong with spying on foreign national leaders, even when they are allies, said NSA head General Keith Alexander and NI director James Clapper at a hearing …

Women crucial for taking infosec industry to next level

Women represent only 11 percent of the information security workforce yet they have the academic background and diverse perspective necessary to accelerate change in the …

When the phone call is more dangerous than malware

During Social Engineer Capture the Flag contest, one of the most prominent and popular annual events at DEF CON 21, a pool of 10 men and 10 women, from diverse backgrounds and …

Secure corporate BYOD solution by ForeScout

ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination …

RSA takes a big data approach to help with high-risk threats

RSA, The Security Division of EMC, at RSA Conference Europe 2013 unveiled RSA Vulnerability Risk Management (VRM), a new software solution designed to help organizations …

US legislators introduce bill to end dragnet phone data collection

US Senate Judiciary Committee Chairman Patrick Leahy and Congressman Jim Sensenbrenner, chairman of the Crime and Terrorism Subcommittee in the House, introduced on Tuesday a …

AmEx users targeted with well-crafted phishing scheme

A rather well-executed phishing campaign is targeting American Express users via fake “Fraud Alert: Irregular Card Activity” emails impersonating the AmEx Fraud …

Syrian hackers hijack Obama’s tweets

The Syrian Electronic Army has apparently managed to modify tweets from Barack Obama’s official Twitter account to include links to a pro-Assad video, as well as …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools