Please turn on your JavaScript for this page to function normally.
OpenSSH bug enables attackers to brute-force their way into poorly configured servers

A vulnerability in the popular secure remote access software OpenSSH can be exploited by attackers to try to brute-force their way into the connection and access …

Bug in OS X Yosemite allows attackers to gain root access

Security researcher Stefan Esser has revealed the existence of a privilege escalation vulnerability affecting OS X 10.10 (Yosemite), and has provided a working proof of …

How experts stay safe online and what non-experts can learn from them

Google researchers have asked 231 security experts and 294 web-users who aren’t security experts about their security best practices, and the list of top ones for each group …

Smartwatches: A new and open frontier for attack

Smartwatches with network and communication functionality represent a new and open frontier for cyberattack, according to HP. They found that 100 percent of the tested …

Test your defensive and offensive skills in the eCSI Hacker Playground

BalaBit and Silent Signal today announced that registration is now open for the eCSI Hacker Playground. The hacker challenge is a global online competition, specially designed …

Do CISOs deserve a seat at the leadership table?

A ThreatTrack security survey of C-level executives at U.S. enterprises employing a CISO found that despite a rash of high-profile data breaches in the last year, many in the …

Global managed security services market to reach $29.9 billion by 2020

The global managed security services market is expected to reach $29.9billion by 2020, registering a CAGR of 15.8% during 2014-2020, according to Allied Market Research.The …

Google helps Adobe improve Flash security

Adobe has been dealt a heavy blow after the Hacking Team data dump produced three Flash Player zero-day exploits and they begun being exploited in the wild.While Adobe was …

600TB of data exposed due to misconfigured MongoDB instances

Shodan, the search engine that lets users find devices connected to the Internet, can be used for a number of different things. As its creator, John Matherly, pointed out, …

Google Chrome update includes 43 security fixes

Google has released Chrome version 44.0.2403.89 for Windows, Mac, and Linux to address multiple vulnerabilities. Exploitation of one of these vulnerabilities may allow an …

It’s official: The average DDoS attack size is increasing

New global DDoS attack data from Arbor Networks shows strong growth in the average size of DDoS attacks, from both a bits-per-second and packets-per-second perspective.The …

Information security governance practices are maturing

Information security governance practices are maturing according to Gartner’s annual end-user survey for privacy, IT risk management, information security, business …

Don't miss

Cybersecurity news