Please turn on your JavaScript for this page to function normally.
Opera VPN
Opera browser now comes with free built-in VPN

Opera added a free VPN client with unlimited data usage in its newest developer version. All other VPNs for the major desktop browsers are extensions, with most of them based …

password unlock
How to automate a custom password dictionary for your pen test

When doing penetration testing, security professionals regularly have to deal with words that are specific to the task at hand, and many are not found in common wordlists. …

Solutionary report
A global data analysis of hostile activity

Solutionary’s latest Global Threat Intelligence Report contains information from 24 security operations centers, seven R&D centers, 3.5 trillion logs, 6.2 billion …

Ubuntu
Ubuntu 16.04 LTS introduces “snaps” for new robust, secure app format

Canonical released Ubuntu 16.04 LTS, featuring the new “snap” package format and LXD pure-container hypervisor. An Ubuntu Long Term Support (LTS) release is …

Oracle
Oracle patches 136 flaws in 49 products

Oracle released the April 2016 Critical Patch Update, which provides fixes for 136 vulnerabilities in 49 products, including Java SE and MySQL, the company’s Database …

traffic
Hacking and manipulating traffic sensors

With the advent of the Internet of Things, we’re lucky to have researchers looking into these devices and pointing out the need for securing them better. One of these …

ransomware
The many faces and tactics of Jigsaw crypto-ransomware

The Jigsaw crypto-ransomware got its name from the main bad guy from the popular horror movie franchise Saw, as its initial ransom note (either in English or Portuguese) shows …

vault
Ransomware attacks escalate, companies largely unprepared

Ransomware attacks against endpoints have recently taken place against hospitals in the US and Germany. Attacks have increased in severity to the point that the FBI issued an …

business
Exposing the Cybercrime as a Business model

Trustwave released a new report which reveals the top cybercrime, data breach and security threat trends from 2015. Experts gathered real-world data from hundreds of breach …

desk
Employees risk corporate security by accessing pirated content

6 in 10 Brits who use personal devices for work also use the same device for streaming or downloading pirated content. Whilst the research, conducted by OnePulse, found that …

Nexus
Flaw allows eavesdropping and tracking of mobile phone users

German hacker Karsten Nohl has demonstrated to the crew of CBS News’ 60 Minutes program how easy it can be for well-resourced attackers to eavesdrop on the phone calls …

javascript warning Windows
Beware of emails with JavaScript attachments!

Malware peddlers are always looking for the next trick to get users to infect their computers. According to Microsoft and other sources, the current latest trick is malicious …

Don't miss

Cybersecurity news