Please turn on your JavaScript for this page to function normally.
WikiLeaks publishes documents stolen from CIA director’s email account

CIA Director John Brennan’s private AOL email account has been hacked, apparently by teenage hackers with good social engineering skills.While it seems that the account …

Think twice about Android root

In recent years the practice of Android rooting, that is the process of allowing an Android phone or tablet to bypass restrictions set by carriers, operating systems or …

Fitbit trackers can easily be infected with malware, and spread it on

Security researcher Axelle Apvrille has managed to deliver malware to a FitBit Flex fitness tracker, and to spread the infection to any computer that the device is …

Back to the Future: How much of Marty and Docs’ tech is a reality?

Yesterday was October 21st – the day Marty and Doc crashed into the future in the second Back to the Future sci-fi film, released in 1989. But what did the creators get right? …

Tech support scammers start targeting users of Apple devices

With the rise of popularity and the widespread ubiquity of devices made by Apple, it was only a matter of time when tech support scammers would begin targeting that ever …

Tech-savvy users are actually the worst offenders

Even as businesses and the federal government have made cybersecurity a high priority, 93% of office workers engage in some form of unsafe online habits that could jeopardise …

Free PCI and NIST compliant SSL test

High-Tech Bridge announced a free online service designed to check SSL/TLS security of a web server. It performs four distinct tests: Test for compliance with NIST Guidelines …

1 in 4 organizations have experienced an APT

A new ISACA study found that more than one in four (28%) have already experienced an APT attack. The study found that mobile device security continues to lag at many …

IS hackers are attacking the US energy grid

The US energy grid is under cyber attack from Islamic State hackers but fortunately, these attacks end up in failure because the hackers are simply not skilled enough to do …

8 key online fraud behaviors and patterns

Sift Science examined data from 1.3 million online transactions and profiles in various industries from August 2014 to August 2015. Data was cross-referenced with third-party …

Wargame teaches senior leaders about strategic threats and risks

On Oct. 13 Booz Allen and the FC2 held a cybersecurity wargame simulation for senior officials in the public and private sectors at the University of South Florida, the home …

Malicious Google Chrome clone eFast serves ads, collects info

A Google Chrome lookalike browser dubbed eFast is being actively pushed onto users. The software is at best annoying and unwanted, and at worst can lead users to …

Don't miss

Cybersecurity news