Please turn on your JavaScript for this page to function normally.
Desk
Compromised credentials still to blame for many data breaches

Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance (CSA). Data breaches, account hijacking and …

general virtual digital
Week in review: Opera’s VPN is just a proxy, GDPR compliance, hacking traffic sensors

Here’s an overview of some of last week’s most interesting news and articles: Hacking Team hacker explains how he did it In a Pastebin post, he shared that he …

encryption
PGP-encrypted comms network allegedly used by criminals shuts down

The Dutch police has announced on Tuesday that they have pulled a system of encrypted communications used by Dutch and possible foreign criminals off the air, and that they …

SkullConduct
A password for your eyewear computer: The sound of your skull

Could the unique frequency response your skull makes when hit with an ultrasonic signal be a good way for authenticating yourself to an eyewear computer (e.g. Google Glass, or …

Opera hand
Opera browser’s VPN is just a proxy, here’s how it works

Yesterday, Opera announced they’ve added a free VPN client with unlimited data usage in the latest developer version of their browser. Sounds great, doesn’t it? …

lighter
TeslaCrypt: New versions and delivery methods, no decryption tool

TeslaCrypt ransomware was first spotted and analyzed in early 2015, and soon enough researchers created a decryption tool for it. The malware has since reached versions 4.0 …

industry
The future of ICS security depends on OT-centric security solutions

New cybersecurity operational technologies are emerging to protect industrial control systems (ICS) against impending IT threats and attacks. ABI Research indicates that …

payment card
Increase in credit card leaks with high profile apps and sites

A new report reveals a continued rise in apps and mobile websites leaking credit card data, with several new cases from prominent brands, including the Hong Kong metro system. …

red wall
IT channel security practices will balance products, processes and skills

A comprehensive security offering is quickly moving from simple product installation to an ongoing process. IT channel companies that highlight processes and education along …

Anomali
Anomali lands $30 million in series C funding

Anomali, the provider of ThreatStream threat intelligence and Anomali Enterprise platforms, has raised $30 million in series C funding. The round, led by Institutional Venture …

Farmer iPad
FBI warns farming industry about equipment hacks, data breaches

As Internet-connected equipment is increasingly used in many industry sectors, alerts like the latest one issued by the FBI to US farmers will likely become a regular …

ransomwhere
Researcher develops tool that blocks OS X crypto-ransomware

In his spare time, security expert Patrick Wardle (who’s also director of R&D at Synack) creates OS X security tools. The latest addition to his collection is …

Don't miss

Cybersecurity news