Zeljka Zorz
How you can anonymously use public Wi-Fi from miles afar
Benjamin Caudill, founder of Rhino Security Labs, is scheduled to demonstrate at the upcoming DefCon a new device that could help users achieve and maintain their online …
Plex forums hacked: IPs, private messages, encrypted passwords compromised
Users of Plex’s forums are being forced to change their password in wake of a breach that resulted in the compromise of some of their private information, including …
Amazon releases new, easily auditable TLS implementation
A new, open source implementation of the TLS encryption protocol has been unveiled by Amazon Web Services.Dubbed s2n (shorthand for “signal to noise”), the library …
Harvard University suffers IT security breach
Discovered on June 19, the intrusion was first spotted on the Faculty of Arts and Sciences and Central Administration information technology networks, but a subsequent …
Cloned, booby-trapped Dark Web sites steal bitcoins, login credentials
Someone is cloning .onion sites, and using the clones to intercept user traffic and offer modified content.“I noticed a while ago that there is a clone onion site for …
How safe is the Windows 10 Wi-Fi sharing feature?
A feature that went almost unnoticed in Windows Phone 8.1 because of its modest installation base has been raising security questions now that it has been added to Windows …
Researchers point out the holes in NoScript’s default whitelist
Security researchers Linus Särud and Matthew Bryant hav recently discovered some pretty big holes in NoScript, a popular Firefox plugin that prevents executable web content …
Security updates for OS X, iOS fix bucketload of serious bugs
Apple has released security updates for Safari, OS X Yosemite (and previous OS X versions), and iOS.The OS X update contains fixes for 77 vulnerabilities, many of which can be …
Researchers eliminate coding errors by using good code from “donor” apps
The main appeal of open source software is in the fact that its source code can be reviewed by anyone and, theoretically, stealthy backdoors and unintentional errors should be …
Fake Twitter verification profiles trick victims into sharing personal, payment card info
A little over 18,000 Twitter users looking for a way to get their accounts verified have been duped by a single fake account promising to provide the service into visiting a …
US OPM takes vulnerable background investigation portal offline
The US Office of Personnel Management announced on Monday that it has temporarily suspended the E-QIP (Electronic Questionnaires for Investigations Processing) system, a …
Popular VPNs leak data, don’t offer promised privacy and anonymity
Virtual Private Network (VPN) services can be used for circumventing Internet censorship and accessing blocked content, but researchers warn that you shouldn’t believe …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader