
Crypto-ransomware attacks hit over 700,000 users in one year
Kaspersky Lab found a drastic increase in encryption ransomware attacks, with 718,536 users hit between April 2015 and March 2016. This is an increase of 5.5 times compared to …

Godless Android malware offers serious firepower to a botnet herder
One of the most concerning characteristics of the Godless malware is the ability to receive remote instructions on which app to download and install on mobile devices, without …

IoT threats drive global embedded security shipments
With the rise of IoT, pressure to mitigate cyber risks in connected devices is mounting. Though security is a big concern, connected devices from autonomous vehicles to smart …

Your nearest and dearest are snooping on your phone
If you needed one more reason for protecting your phone with a passcode or fingerprint, here it is: there’s a good chance that one or more of the people close to you …

154 million US voter records exposed following hack
MacKeeper security researcher Chris Vickery has discovered yet another database containing voter profiles of US citizens, accessible to anyone who stumbled upon it or knew …

Severe flaws patched in libarchive, dependent projects urged to follow
Three severe bugs that could be easily exploited to perform arbitrary code execution have been patched with version 3.2.1 of the libarchive open source multi-format archive …

(IN)SECURE Magazine issue 50 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 50 has been released today. Table of contents …

Cloud-first is replacing the defensive no-cloud stance
By 2020, a corporate “no-cloud” policy will be as rare as a “no-Internet” policy is today, according to Gartner. Cloud-first, and even cloud-only, is …

FAA finalizes operational rules for drones
The Department of Transportation’s Federal Aviation Administration has finalized the first operational rules for routine commercial use of small unmanned aircraft systems (UAS …

ApocalypseVM ransomware decrypter released
AV company Emsisoft has added yet another ransomware decrypter tool to its stable: a decrypter for ApocalypseVM. The tool works on the latest versions of the ransomware in …

Tech support scammers impersonate victims’ ISP
Tech support scammers have switched from cold calls to pop-ups ambushing users online, seemingly coming from the victims’ ISP. In the US and Canada, Verizon, AT&T …

Google’s new authentication option: a tap on the screen
Google knowns that usability is a pre-requisite for security, so they’ve come up (yet again) with a new option within the 2-step verification feature for Google …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?