Please turn on your JavaScript for this page to function normally.
Making one organization’s incident everyone’s defense

The Financial Services Information Sharing and Analysis Center (FS-ISAC), an organization focused on sharing critical cyber security threat information worldwide, and The …

Blackphone and Silent Circle announce bug bounty program

Blackphone and Silent Circle today announced the launch of their bug bounty program. Both companies’ mission is to enable secure and private communications for …

McAfee delivers new security suites

McAfee released McAfee AntiVirus Plus 2015, McAfee Internet Security 2015, McAfee Total Protection 2015, and the McAfee LiveSafe 2015 service that protects a customer’s …

CipherShed: A replacement for TrueCrypt

Ever since TrueCrypt developers terminated the development of the popular encryption utility and announced that it was not safe to use, users who need such a tool have been …

Threema
Secure mobile messaging with Threema

If you're concerned about the privacy of your mobile communications, there's a variety of tools you can use to protect yourself. Today I'm taking a closer look at Threema, a …

How a large ISP fights DDoS attacks with a custom solution

DDoS attacks are a growing problem. In July, Arbor Networks released global DDoS attack data derived from its ATLAS threat monitoring infrastructure that shows a surge in …

DARPA is after vulnerabilities in algorithms implemented in software

The Defense Advanced Research Projects Agency (DARPA) is looking for new program analysis techniques and tools to enable analysts to identify vulnerabilities in algorithms …

Blackphone security issues and vulnerabilities unveiled

Blackphone, the carrier- and vendor-independent smartphone that was created with the goal of placing privacy and control directly in the hands of its users, is not without its …

Researchers compile list of Android apps that allow MitM attacks

Around 350 Android apps that can be downloaded from Google Play and Amazon stores fail to properly validate SSL certificates for HTTPS connections, and thus open users to …

New Firefox offers MITM protection via public key pinning

Mozilla has released the latest version of Firefox (v32) for Windows, Mac, Linux, and Android, and the new browser sports some notable security improvements. For one, the new …

Free security software identifies cloud vulnerabilities

Whether responding to customer orders or requesting partner data, the biggest cloud security concern for the enterprise is the direct communication between applications. To …

Tox: Open-source, P2P Skype alternative

If you like the convenience of Skype, but you are worried about government surveillance and don’t trust Microsoft to keep you safe against it, Tox might be just the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools