Please turn on your JavaScript for this page to function normally.
idea
Security tips and tricks for businesses and consumers

In 2015, the number of zero-day vulnerabilities discovered more than doubled to a record-breaking 54, a 125 percent increase from the year before, reaffirming the critical …

abstract lights
Public institutions targeted with shape changing Qbot malware

A new strain of Qbot, malicious software that steals user credentials and creates backdoors on targeted devices, has infected over 54,000 PCs in thousands of organisations …

samsung galaxy lock bypass
Samsung Galaxy devices can be made to make calls, send messages while locked

Half a dozen (and possibly even more) Samsung Galaxy phones can be made to place phone calls or send text messages even when they are locked, thanks to exposed USB modems. …

world in hand
After issuing 1.7M certificates, Let’s Encrypt CA officially leaving beta

Let’s Encrypt, the non-profit Certificate Authority (CA) backed by the Electronic Frontier Foundation, Mozilla, Cisco, Akamai, and others, is ready to be considered a …

bomb
6,013 breaches reported in the US since 2005

In 2005, the Identity Theft Resource Center (ITRC) began monitoring and tallying the ever-growing number of US security breaches. Since then, the organization has seen a 397 …

Netwrix
Netwrix Auditor 8.0: Visibility into hybrid cloud IT infrastructures

Netwrix released Netwrix Auditor 8.0. The new version of the IT auditing platform simplifies detection of security threats and enables organizations to gain control over …

gophish
GoPhish: Free phishing toolkit for training your employees

Too many system and network breaches today start with a well-designed, persuasive phishing email, and organizations and businesses would do well to continually train their …

success
Identify the ransomware you’ve been hit with

Michael Gillespie, a coder that has created a password generator for unlocking the files stashed in a password-protected archive by the CryptoHost ransomware, has also created …

open lock
CryptoHost locks files, but you can get them back

If you’re a user whose files are held for ransom by the CryptoHost (aka Manamecrypt) ransomware, despair no more about getting them back without paying for it – …

lock
Cybercriminals are adopting corporate best practices

Cybercriminals are adopting corporate best practices and establishing professional businesses in order to increase the efficiency of their attacks against enterprises and …

professional
How to prepare for your first infosec job hunt

You’re new to the information security industry and you’re wondering what to expect during an interview. A quick online search will bring up horror stories …

cloud computing
Attacks are driving cloud security market growth

The global cloud security market is expected to grow at a CAGR of over 20% until 2019, according to Technavio. “A key reason for the adoption of cloud security is the sudden …

Don't miss

Cybersecurity news