Please turn on your JavaScript for this page to function normally.
NSA targets sys admins to breach computer networks

A newly analyzed document from Edward Snowden’s trove show that the NSA collects personal and account information on system administrators and uses it to compromise …

Bitcoin software update fixes transaction ID malleability bugs

Bitcoin Core – as the Bitcoin infrastructure software has been renamed to in order to avoid confusion with the the Bitcoin network – has been updated to make, …

Microsoft accessed Hotmail account to uncover internal leaker

This week’s charging of a former Microsoft employee for stealing the company’s trade secrets could have passed almost unnoticed were it not for an important detail …

BlackOS malicious web traffic managing software is on sale

Security researchers are keeping a close eye on underground cybercrime forums and are quick to spot new offerings, such as the BlackOS software package. Not to be confused …

US tech firms knew about and assisted with PRISM data collection

In a testimony before the Privacy and Civil Liberties Oversight Board, the NSA general council Rajesh De and his colleague stated on Wednesday that the tech companies that …

Over 31,000 IoT devices and computers infected by cryptocoin-mining worm

A new version of the Darlloz Linux worm, which targets Internet-enabled devices such as home routers and security cameras, computers running Intel x86 architectures as well as …

Oracle releases Java 8

Oracle has released Java Standard Edition (SE) 8, Java Development Kit (JDK) 8, and Java Runtime Environment (JRE) 8. The new releases work on Windows 8, Windows 7, Windows …

Tor warns of malicious Tor browser offered on the App Store

A public plea made on Twitter by Runa A. Sandvik, a (former?) developer with The Tor Project has turned the spotlight on a still unresolved issue of an apparently fake Tor …

Fake Malaysia Airlines Flight 370 video hides a backdoor

As the search for the missing Malaysia Airlines Flight 370 nears the end of the second week, cyber crooks are diversifying the attacks against users curious to know what …

NSA records a country’s phone calls, keeps the records for a month

By leveraging a surveillance system dubbed MYSTIC, the US National Security Agency has been recording all phone calls made in a foreign country for a period of 30 days, newly …

Aversion to new Facebook News Feed could lead to scams

Facebook has been gradually rolling out a new, more simplified design for users’ News Feed for a while now. It’s a given that some users won’t like the …

Thinking with Data: How to Turn Information into Insights

With the advent of computer systems and the Internet, data has become plentiful and easily accessible. The problem now is to separate the wheat from the chaff, and discover …

Don't miss

Cybersecurity news