Please turn on your JavaScript for this page to function normally.
https
Google to enforce HTTPS on TLDs it controls

In its sustained quest to bring encryption to all existing Web sites, Google has announced that it will start enforcing HTTPS for the 45 Top-Level Domains it operates. How …

Yahoo
The 2013 Yahoo breach affected all 3 billion of its users

Yahoo, now part of the newly created Verizon subsidiary Oath, has announced that the 2013 breach it disclosed in December 2016 affected more users than previously believed. …

Equifax
Equifax, former CEO reveal more details about the devastating breach

Mandiant has concluded the forensic part of its Equifax breach investigation, and the results are as follows: 2.5 million additional US consumers were potentially impacted, …

dnsmasq
Widely used DNS forwarder and DHCP server Dnsmasq riddled with flaws

Google researchers have discovered seven serious vulnerabilities in Dnsmasq, a lightweight, widely used DNS forwarder and DHCP server for small computer networks. Dnsmasq is …

Stack Overflow
Secure coding in Java: Bad online advice and confusing APIs

For programmers and software developers, the Internet forums provide a great place to exchange knowledge and seek answers to concrete coding conundrums. Alas, they are not …

Bug
The Internet Bug Bounty offers rewards for bugs in data processing libraries

The Internet Bug Bounty (IBB), a project aimed at finding and fixing vulnerabilities in core internet infrastructure and free open source software, has announced that it will …

Apple
Is your Mac software secure but firmware vulnerable?

Mac users who have updated to the latest OS version or have downloaded and implemented the most recent security update may not be as secure as they originally thought, Duo …

Bitcoin
How to keep your cryptocoins safe?

Intrigued by the many possibilities of cryptocurrencies – not least by the prospect to “earn” serious money while doing nothing – you’ve decided …

cybersecurity
Activists targeted with barrage of creative phishing attempts

More often than not, the human element is the weakest link in the security chain. This fact is heavily exploited by cyber attackers, and makes phishing and spear-phishing …

Apple Face ID
How Apple’s Face ID works, learns, and protects

Apple has unveiled a new version of its privacy page and a paper throwing more light on how Face ID, its newest biometric authentication option, works on iPhone X …

hunt
Laying the foundation for a proactive SOC

Most companies are trying to shift their Security Operations Center (SOC) from a reactive to a proactive posture. To do that, the analysts’ reaction to security events …

Deloitte
After hack, security researchers probe Deloitte’s security posture

It’s difficult – if not impossible – for any organization to keep their networks and systems completely safe from knowledgeable, well-resourced and …

Don't miss

Cybersecurity news