Please turn on your JavaScript for this page to function normally.
Relations between spam landscape actors can be leveraged for detection

Since late 2012, a group of researchers from UC Santa Barbara and RWTH Aachen University has been working on finding out the relations that exist between the different actors …

Google unveils source code for Chrome encryption extension

Google has made publicly available the source code for a new Chrome extension that helps users encrypt, decrypt, digitally sign, and verify signed messages within the browser …

Critical bug in GnuTLS crypto library could allow malicious code execution

Another critical bug in an open source SSL/TLS (and DTLS) cryptographic library has been discovered and patched last week. The affected library is GnuTLS, and is used in a …

12,000 users ask Google to forget them

12,000 pleas from users looking to be forgotten have been submitted to Google in the first 24 hours since the company created a dedicated submission page for such requests, …

Researcher automates discovery of Facebook users’ hidden friends

Putting a friend on Facebook on your “private” list does not guarantee you that anyone else won’t be able to spot the relationship, says researcher Shay …

More developers looking to keep TrueCrypt alive

The news that the developers of TrueCrypt have abandoned the popular software has hit the security community like a ton of bricks, but there is apparently no lack of people …

Beware of emails offering bogus HeartBleed removal tool

Malware peddlers are taking advantage of the fact that the existence of the Heartbleed bug has breached the confines of the cyber security world and has entered the awareness …

Molerats attacks continue targeting US, EU, Middle East organizations

Not all RAT-wielding attackers come from China, say FireEye researchers. For over a year they have been following the activities of a group of hackers that uses the Poison Ivy …

Cupid exploits Heartbleed bug on WiFi networks and Android

Nearly two months have passed since the public revelation of the Heartbleed bug affecting the widely used open source cryptographic library OpenSSL. The reaction of the …

NSA collects photos to feed facial recognition programs

The NSA has been collecting photos of people’s faces at the tune of 55,000 images every day, and has been feeding the images into its facial recognition programs, James …

Open Crypt Audit Project considers taking over development of TrueCrypt

The unexpected notice saying TrueCrypt isn’t safe, which has apparently been posted last week by the developers of the software, took the security community by surprise …

What inspired you to start hacking?

This is a question that Jennifer Steffens, IOActive CEO, often asks hackers she meets on conferences around the world. More often than not, the answer is movies: War Games, …

Don't miss

Cybersecurity news