Please turn on your JavaScript for this page to function normally.
Researchers sinkhole several Cryptolocker C&Cs

The cyber crooks behind Cryptolocker, one of the latest ransomware threats, are having much success in infecting PC users with the deadly malware, but whether the victims fork …

Protect data before sending it to the cloud

IBM inventors have developed a technique for protecting sensitive data prior to transmitting it to the cloud. The patented invention will overcome barriers to client adoption …

Free eBook: OpenSSL Cookbook

If your job has something to do with security, web development, or system administration, you can’t avoid having to deal with OpenSSL on at least some level. This book …

iPhone secure messaging with self-destruct mechanism via Wickr app

Wickr was one of the most interesting companies I was introduced to at this year’s RSA Conference in San Francisco. The company was one of the finalists of the …

Apple’s iCloud protocols cracked and analyzed

Smartphones carry a lot of sensitive data that in theory should be accessible only to their owners. In practice, a lot of it can be exfiltrated from the devices and from the …

Lavabit users allowed to access accounts and retrieve data

Lavabit’s Ladar Levison has announced that the users of his recently closed down email service will be able to briefly access their accounts so that they can retrieve …

CipherCloud delivers searchable strong encryption

CipherCloud has delivered techniques to improve the searchability, usability and security of cloud data protected with AES 256-bit encryption. The solution also enables …

WhatsApp encryption flaw revealed, POC code published

A Dutch researcher says that the encryption solution implemented by popular cross-platform IM service WhatsApp is flawed. He claims that the company has not thought it out as …

GnuPG 2.0.22 fixes security problem

GnuPG 2.0.22 is a security fix release and all users are advised to updated to this version. What’s new: Fixed possible infinite recursion in the compressed packet …

Shell Control Box now monitors web based applications

BalaBit IT Security announced a new version of its Shell Control Box (SCB) activity monitoring appliance. The latest version of SCB makes forensics investigations easier, …

Tor-using Mevade botnet is stealthy new version of old threat

The Mevade Trojan and botnet have gained unexpected notoriety when it turned out that the majority of the recent, sudden and massive uptick in Tor users was the result of it …

Organizations fear their privacy activities are insufficient

The perceived level of maturity attached to organizations’ privacy activities has decreased since 2011, as many organizations deem their existing privacy activities to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools