Please turn on your JavaScript for this page to function normally.
Old MS Office feature can be exploited to deliver, execute malware

A Microsoft Office functionality that has been in use since the early 1990s can be exploited to deliver malicious, executable files to users without triggering widely used …

Let’s Encrypt CA releases transparency report before its first certificate

The non-profit CA launched by the EFF, Mozilla and several other businesses and organizations is determined to gain and retain users’ trust. After hiring outside experts …

Hacking Team hacked, 400GB+ of company documents and emails leaked

Hacking Team, the (in)famous Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies around the …

Mastercard is trying out purchase verification with selfies

Five hundred US MasterCard users will soon be testing out the company’s new system for quickly processing of digital payments, without having to input a PIN or …

How you can anonymously use public Wi-Fi from miles afar

Benjamin Caudill, founder of Rhino Security Labs, is scheduled to demonstrate at the upcoming DefCon a new device that could help users achieve and maintain their online …

Plex forums hacked: IPs, private messages, encrypted passwords compromised

Users of Plex’s forums are being forced to change their password in wake of a breach that resulted in the compromise of some of their private information, including …

Amazon releases new, easily auditable TLS implementation

A new, open source implementation of the TLS encryption protocol has been unveiled by Amazon Web Services.Dubbed s2n (shorthand for “signal to noise”), the library …

Harvard University suffers IT security breach

Discovered on June 19, the intrusion was first spotted on the Faculty of Arts and Sciences and Central Administration information technology networks, but a subsequent …

Cloned, booby-trapped Dark Web sites steal bitcoins, login credentials

Someone is cloning .onion sites, and using the clones to intercept user traffic and offer modified content.“I noticed a while ago that there is a clone onion site for …

How safe is the Windows 10 Wi-Fi sharing feature?

A feature that went almost unnoticed in Windows Phone 8.1 because of its modest installation base has been raising security questions now that it has been added to Windows …

Researchers point out the holes in NoScript’s default whitelist

Security researchers Linus Särud and Matthew Bryant hav recently discovered some pretty big holes in NoScript, a popular Firefox plugin that prevents executable web content …

Security updates for OS X, iOS fix bucketload of serious bugs

Apple has released security updates for Safari, OS X Yosemite (and previous OS X versions), and iOS.The OS X update contains fixes for 77 vulnerabilities, many of which can be …

Don't miss

Cybersecurity news