Please turn on your JavaScript for this page to function normally.
Free tool tracks DNS changes in DNS zone files

Incorrect edits to DNS can have catastrophic consequences such as disconnecting an entire company website or its email servers and causing costly downtime. LogicMonitor …

Hong Kong protesters hit with malware, turn to “off-the-grid” chat app

The pro-democracy protests started by Hong Kong students’ and backed by the Occupy Central protesters (Central is the name of Hong Kong’s financial district) are …

Data Protection For Photographers
Data Protection for Photographers

Today's high resolution digital cameras ensure that active photographers have to manage massive amounts of data. Keeping this data safe in the long run can present a …

Making one organization’s incident everyone’s defense

The Financial Services Information Sharing and Analysis Center (FS-ISAC), an organization focused on sharing critical cyber security threat information worldwide, and The …

Blackphone and Silent Circle announce bug bounty program

Blackphone and Silent Circle today announced the launch of their bug bounty program. Both companies’ mission is to enable secure and private communications for …

McAfee delivers new security suites

McAfee released McAfee AntiVirus Plus 2015, McAfee Internet Security 2015, McAfee Total Protection 2015, and the McAfee LiveSafe 2015 service that protects a customer’s …

CipherShed: A replacement for TrueCrypt

Ever since TrueCrypt developers terminated the development of the popular encryption utility and announced that it was not safe to use, users who need such a tool have been …

Threema
Secure mobile messaging with Threema

If you're concerned about the privacy of your mobile communications, there's a variety of tools you can use to protect yourself. Today I'm taking a closer look at Threema, a …

How a large ISP fights DDoS attacks with a custom solution

DDoS attacks are a growing problem. In July, Arbor Networks released global DDoS attack data derived from its ATLAS threat monitoring infrastructure that shows a surge in …

DARPA is after vulnerabilities in algorithms implemented in software

The Defense Advanced Research Projects Agency (DARPA) is looking for new program analysis techniques and tools to enable analysts to identify vulnerabilities in algorithms …

Blackphone security issues and vulnerabilities unveiled

Blackphone, the carrier- and vendor-independent smartphone that was created with the goal of placing privacy and control directly in the hands of its users, is not without its …

Researchers compile list of Android apps that allow MitM attacks

Around 350 Android apps that can be downloaded from Google Play and Amazon stores fail to properly validate SSL certificates for HTTPS connections, and thus open users to …

Don't miss

Cybersecurity news