Please turn on your JavaScript for this page to function normally.
Commercial code is more compliant to security standards than open source code

A new report details the analysis of nearly 10 billion lines of source code through the Coverity Scan service and usage of the Synopsys Coverity Software Testing Platform.For …

United Airlines hacked by same group that breached Anthem and OPM

United Airlines has been breached, and investigators believe the perpetrators to be the same group that hacked US health insurer Anthem and stole personal and employment …

More than a third of employees would sell company data

A Loudhouse survey on enterprise security practices reveals that 35 percent of employees would sell information on company patents, financial records and customer credit card …

Distrust in use of personal data could hinder business growth

A study from the Digital Catapult has explored trust in the use of personal data and revealed worrying trends which could hinder the delivery of digital services and business …

Most malvertising attacks are hosted on news and entertainment websites

“More than 50 percent of malvertising is unknowingly hosted on news and entertainment websites, according to Bromium. “Bad actors look to extend their reach as far …

Rowhammer.js: The first remote software-induced hardware-fault attack

A group of Austrian and French researchers have devised a relatively simple way to remotely exploit the Rowhammer bug present in some computer chips. Their version of the …

Check out the Windows 10 security features

Today is the day that Windows 10 becomes available to users around the world.The new (and some old-but-new again) features are already known to the public: the Start button is …

Breaches might be inevitable, but penalties are not harsh enough

A panel on the topic of data breaches organized by cyber security and penetration testing company Cognosec has revealed that most industry professionals believe that breaches …

Users force LinkedIn to bring back connections download tool used by scrapers

LinkedIn users have rejected a new data export process set up by the company, which would allow them to export their connections’ information with a delay of 24 or, …

Can organizations hold back the tide of cloud adoption?

For many organisations holding back the tide of cloud-based services adoption is almost impossible as the use cases are overwhelming, according to a new report by analyst firm …

Apple patches serious remotely exploitable iTunes and App Store flaw

Security researcher Benjamin Kunz Mejri from Vulnerability Lab has discovered a serious vulnerability in Apple’s App Store and iTunes web apps, which can lead to …

Chrome extension thwarts user profiling based on typing behavior

The problems with passwords have already been well documented, and the main problem with static biometrics (“something you are”: fingerprints, retina patterns, …

Don't miss

Cybersecurity news