Please turn on your JavaScript for this page to function normally.
Microsoft issued Fix it for actively exploited IE 0-day

Microsoft has yesterday unexpectedly released a security advisory warning users about instances of active exploitation of a vulnerability found in all supported versions of …

LynuxWorks releases a rootkit detection system

LynuxWorks announced the RDS5201, a new product to help detect the rootkit. Built on the LynxSecure 5.2 separation kernel and hypervisor, this small-form-factor appliance has …

Recommendations for strengthening cyber security policies

McAfee and the Digital Government Security Forum (DGSF) released a new report which explores the cyber risks confronting government and offers recommendations to mitigate …

Firefox 24 delivers 17 security updates

Mozilla released Firefox 24, which includes 17 security updates: seven are critical, four high, and six moderate. Fixed in this version: MFSA 2013-92 GC hazard with default …

USB “condom” protects from mobile device juice jacking

A group of Georgia Tech researchers has created quite a stir at this year’s Black Hat conference when they showcased chargers capable of installing malware on iPhones, …

Self-healing BIOS security from HP

HP announced HP BIOSphere with SureStart technology, a self-healing security solution created to help organizations better manage risk and protect user and IT productivity. HP …

Kaspersky Lab launches solution for multi-device security

Kaspersky Lab announced Kaspersky Internet Security – Multi-Device, a new security product that provides a way for customers to secure their Internet activity across …

Software for DIY data recovery, data protection and data destruction

Kroll Ontrack announced Ontrack EasyRecovery 11, a solution for DIY data recovery, data protection and data destruction. It includes new S.M.A.R.T. scan technology to monitor …

Mobile Pwn2Own: $300k prize pool awaits successful contestants

The next Mobile Pwn2own competition is to be held in November at the PacSec Applied Security Conference in Tokyo, and contestants can earn as much as $100,000 for a successful …

Too long passwords can DoS some servers

The discovery of a vulnerability in popular open source web application framework Django has recently demonstrated that using a long password is not always the best thing to …

30 Percent of transactions conducted from Tor are fraudulent

iovation announced that 30.2 percent of transactions conducted from Tor (the onion router) in August were fraudulent. This compared with an overall fraud rate of 1 percent for …

Researchers create undetectable layout-level hardware Trojans

The fact that most of computer hardware is produced outside the US and Europe has long presented a worry for the governments of those countries and for the companies and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools