>>> BLACK FRIDAY 2025 cybersecurity deals to explore <<<

Please turn on your JavaScript for this page to function normally.
Gyroscopes on Android devices can be used to eavesdrop on users’ conversations

If you think that denying an app permission to use your phone’s microphone is enough to prevent it from listening in on your conversations, think again, as a group of …

Android ransomware masquerades as Symantec mobile AV

A new piece of Android ransomware is doing rounds, and is tricking users into installing it by posing as a legitimate AV app. The malware sports a logo similar to that of …

Keeping college networks secure

Morris Altman is the Director of Network Services and Internet Security Officer at Queens College, a senior college of the City University of New York. Queens College is the …

New Gameover Zeus variant steadily rebuilds downed botnet

It’s already widely known that the Gameover Zeus gang, whose activity has been temporarily foiled by a successful multi-national law enforcement takedown in June, is …

PGP is fundamentally broken, says crypto expert

“It’s time for PGP to die,” Matthew Green, noted cryptographer and research professor at Johns Hopkins University, opined in a recent blog post. …

ZeroLocker ransomware “helps” you get your files back

In early June, the FBI has lead a rather successful multi-national effort to disrupt the GameOver Zeus botnet which was also responsible for delivering Cryptolocker. …

Beware of fake “Gmail suspicious login” warnings

Malicious emails impersonating Gmail Account Services have been spotted hitting inboxes around the world, falsely claiming that the users’ Gmail account has been logged …

Google starts warning users about deceptive downloads

Google has announced a welcome change to its Safe Browsing service: starting next week, Google Chrome will also warn users about attempts to make them download software that …

Social Engineering Penetration Testing

We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets …

US defense contractors still waiting for breach notification rules

US Department of Defense contractors will have to wait until September 24 to see what specific rules they will be required to follow when it comes to the reporting of computer …

SynoLocker gang planning to move on?

The crooks behind SynoLocker have made some changes to the website sporting the payment instructions. They are trying to spur more victims to pay up by saying that the website …

Fake Tor Project website delivers malware instead of anonymity

A computer science student has discovered an almost perfect copy of The Tor Project’s website, offering malware for download instead of the Tor Browser Bundle and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools