Please turn on your JavaScript for this page to function normally.
Linux
Dirty COW Linux kernel zero-day exploited in the wild is now patched

Linux developer Phil Oester has spotted attackers exploiting a Linux kernel zero-day privilege escalation flaw that dates back to 2007, and has raised the alarm. The …

Weebly
43+ million users affected by confirmed Weebly breach

Weebly, a popular web-hosting service featuring a drag-and-drop website builder, has been breached, and email addresses/usernames, IP addresses and encrypted passwords for …

3d printing
Hacking 3D manufacturing systems demonstrated by researchers

Researchers from three universities combined their expertise to demonstrate the first complete sabotage attack on a 3D additive manufacturing (AM) system, illustrating how a …

Chaos Monkey
Use Chaos Monkey to push engineers to build resilient cloud services

Netflix’s engineering team is good at sharing the tools they create, and keeping them updated to serve different needs. Chaos Monkey is the latest offering that received …

deep web
How cybercriminals attack homes, and how to stop them

At a recent Home Hacker Lab event, an ethical hacker revealed how cybercriminals attack, and what consumers can do to protect themselves. The October 13 workshop in New York …

EU flag
Low GDPR preparedness represents revenue threat

96 percent of companies still do not fully understand the European General Data Protection Regulation (GDPR), despite it coming into effect in May 2018. Elements respondents …

Market
Encryption software market to reach $8.94 billion by 2021

The ecryption software market size is estimated to grow from $3.05 billion in 2016 to $8.94 billion by 2021, at an estimated CAGR of 24.0%, according to MarketsandMarkets. …

MBRFilter: Cisco open sources tool to protect the Master Boot Record

Cisco’s Talos research team has open sourced MBRFilter, a tool that aims to prevent a system’s Master Boot Record (MBR) getting overwritten by malware. The latest …

Cisco
Cisco plugs critical bug in ASA security devices

Cisco has patched a critical vulnerability in the Identity Firewall feature of Cisco ASA Software, which would allow a remote attacker to execute arbitrary code and obtain …

files
EU court: Site operators can log visitors’ IP address for protection against attacks

The Court of Justice of the European Union (CJEU) has ruled that the German government can collect and keep IP addresses of visitors to websites operated by German Federal …

Skype call
Typing while Skyping could leave you vulnerable to eavesdropping

If you type on your desktop or laptop computer’s keyboard while participating in a Skype call, you could be vulnerable to electronic eavesdropping, according to researchers at …

mobile payment
Most would stop using digital payments if breached

88% of respondents to a survey conducted by Wakefield Research would stop using digital payments if they personally fell victim to cybercriminal activities as a result of a …

Don't miss

Cybersecurity news