Please turn on your JavaScript for this page to function normally.
Facebook
Facebook, Google ban fake news sources from their ad networks

Despite Mark Zuckerberg’s dismissive attitude regarding the claim that Facebook had an inappropriate impact on the US elections, the company has moved to bar sources of …

USA flag
UK Home Secretary signs extradition order for British hacker Lauri Love

The extradition order for British hacker Lauri Love has been signed on Monday by the UK Home Secretary Amber Rudd, and Love has 14 days to appeal the decision. The 31-year-old …

ProtonMail
New users flock to ProtonMail in wake of Trump’s victory

Following Donald Trump’s victory in the latest US presidential election, many people begun to worry about the surveillance capabilities that will now effectively be left …

windtalker
Researchers reveal WiFi-based mobile password discovery attack

A group of researchers has come up with WindTalker, a new attack method for discovering users’ passwords and PINs as they enter them into their smartphones. WindTalker …

AdultFriendFinder
Compromised: 339 million AdultFriendFinder users

Friend Finder Networks, the company that operates sites like Adultfriendfinder.com (“World’s largest sex & swinger community”), and Cams.com …

facepalm
Millions of job seekers’ info exposed via easily accessible database backups

A data leak has exposed sensitive information about millions of job seekers that used global recruitment firm Michael Page. The leak has once again been revealed to the …

CPU
Researchers set to work on malware-detecting CPUs

Adding hardware protections to software ones to block the ever-increasing onslaught of computer malware seems like a solid idea, and a group of researchers have just been …

checklist
A checklist for people who understand cyber security

By now, it’s pretty much an accepted reality that it’s only a matter of time until an organization – any organization – gets breached by cyber …

Telegram
Telecrypt ransomware uses Telegram for command and control

Telecrypt, a newly spotted piece of crypto ransomware that uses Telegram’s communication protocol to deliver the decryption key to the crooks, is targeting Russian-speaking …

bomb
Pawn Storm raced to pop many targets before Windows zero-day patch release

As promised, Microsoft provided this Tuesday a patch for the Windows zero-day (CVE-2016-7855) actively exploited by the Strontium (aka Pawn Storm) cyber espionage hacking …

danger
Google Safe Browsing goes after repeat offenders

Google has had enough of sites that repeatedly endanger end users, either through malware, unwanted software, phishing or other social engineering and deceptive tactics. …

magnify
Signal Protocol’s crypto core has no major flaws, researchers find

A group of computer science and cryptography professors and doctoral students has effected a security analysis of the secure messaging Signal Protocol – specifically, of …

Don't miss

Cybersecurity news