Please turn on your JavaScript for this page to function normally.
Popular but fake security app removed from Google Play

In little over a week, a developer selling a security app named Virus Shield on Google Play has managed to earn over $40,000, and the software topped the list of most …

OpenSSL “Heartbleed” bug undermines widely used encryption scheme

OpenSSL, an open-source cryptographic library that is the default encryption engine for popular Web server software and is used in many popular operating system and apps, …

Professional Penetration Testing, Second Edition

Are you interested in a career in penetration testing, and don't know where to start? Here is a book that gathers all the relevant information in one place, and gives a good …

SMS Trojan goes after digital wallets

Not satisfied with the money earned via mobile Trojans sending out text messages to premium numbers, cyber crooks have begun adding other money-stealing functionalities to the …

German police finds 18M stolen and misused account logins

Police in northwestern German city of Verden have discovered a collection of 18 million stolen email addresses and corresponding passwords that are being actively used to send …

CryptoDefense developers “forget” decryption key on victims’ computer

A new piece of ransomware is targeting gullible users, but its developers have made a critical mistake that should allow users to decrypt the affected files without paying the …

Barrett Brown signs (sealed) plea agreement

Barrett Brown, the American journalist that – among other things – is accused of crimes related to the Stratfor hack, has reached a plea agreement with US …

Record year for Facebook bug hunters

With nearly 15,000 submissions – 687 of which were valid and eligible for awards – 2013 has been a record year for Facebook’s bug bounty program. Add to this …

Yahoo encrypts traffic between data centers, plans for encrypted Messenger

Newly appointed Yahoo CISO Alex Stamos has announced on Wednesday that the company has begun fully encrypting all the traffic moving between its data centers. The move was …

Details for 30 Oracle Java Cloud Service flaws revealed

Polish security start-up Security Explorations has publicly released technical details and Proof-of-Concept code for 30 security vulnerabilities they found in Oracle Java …

Network Security Through Data Analysis

One of the most crucial tasks of a network administrator is to keep the network secure - or as secure as possible. In order to do this, they must know of which components the …

Cybercrooks target IoT devices to mine Bitcoins

The results of a recent investigation by SANS ISC CTO Johannes Ullrich are in: cybercriminals have been targeting a variety of Internet-of-Things devices and infecting them …

Don't miss

Cybersecurity news