Please turn on your JavaScript for this page to function normally.
Web Check
Web Check: Open-source intelligence for any website

Web Check offers thorough open-source intelligence and enables users to understand a website’s infrastructure and security posture, equipping them with the knowledge to …

tunnel
Researchers shed light on hidden root CAs

How widespread is the use of hidden root CAs and certificates signed by them? To answer that and other questions, a group of researchers from several Chinese and U.S. …

face
Vulnerability allows attackers to register malicious lookalikes of legitimate web domains

Cybercriminals were able to register malicious generic top-level domains (gTLDs) and subdomains imitating legitimate, prominent sites due to Verisign and several IaaS services …

syringe
Cybercriminals plan to make L7 routers serve card stealing code

One of the Magecart cybercriminal groups is testing a new method for grabbing users’ credit card info: malicious skimming code that can be loaded into files used by L7 …

hand
What can be done about the rising click interception threat?

Ad networks’ increasingly successful efforts to detect bot-based ad click fraud has forced attackers to focus more on intercepting and redirecting legitimate users’ …

DNSSEC
ICANN calls for wholesale DNSSEC deployment

In light of the recent DNS hijacking attacks, the Internet Corporation for Assigned Names and Numbers (ICANN) is urging domain owners and DNS services to implement DNSSEC …

sharing
WWW inventor announces Solid, a push to create a decentralized web users can trust

Tim Berners-Lee, the inventor of the World Wide Web, has not been hiding his disappointment with the direction in which his invention was taken. “The web has evolved …

cryptocurrency
How lucrative is web-based cryptojacking?

1 out of 500 of the one million most visited websites according to Alexa contains a web-based cryptominer that starts mining as soon as the website has been opened in the …

Yahoo
Yahoo woos advertisers with email scanning for targeted ad delivery

While most tech companies that offer free email services are moving away from email scanning as a source of information for advertisers to target users more efficiently, Oath …

https
Half of Alexa Top 1 Million sites now use HTTPS

Slowly but surely, the Internet is on its way to being 100% encrypted. According Scott Helme’s latest analysis of the one million most visited websites according to …

element
How often are users’ DNS queries intercepted?

A group of Chinese researchers wanted to find out just how widespread DNS interception is and has presented the result of their large-scale study to the audience at the Usenix …

Chrome
Chrome starts marking all HTTP sites as “Not secure”

If you’re using Google Chrome and you suddenly start seeing sites you usually visit labeled as “Not secure”, it’s because Google wants to push site …

Don't miss

Cybersecurity news