Please turn on your JavaScript for this page to function normally.
(IN)SECURE Magazine issue 46 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 46 has been released today.Table of contents: The …

Security updates for OS X, iOS fix bucketload of serious bugs

Apple has released security updates for Safari, OS X Yosemite (and previous OS X versions), and iOS.The OS X update contains fixes for 77 vulnerabilities, many of which can be …

Researchers eliminate coding errors by using good code from “donor” apps

The main appeal of open source software is in the fact that its source code can be reviewed by anyone and, theoretically, stealthy backdoors and unintentional errors should be …

Four essential tips that you can use to stay safe when you travel

Whether you’re taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your cyber …

Confidence in antivirus falls to all-time low

While concern for end-user risk persists, confidence is waning in traditional detection-based security solutions, such as antivirus and firewalls. Instead, interest is …

4,900 new Android malware strains discovered every day

“G DATA security experts discovered 440,267 new Android malware strains in the first quarter of 2015, which means that a new mobile malware strain for Android was …

Fake Twitter verification profiles trick victims into sharing personal, payment card info

A little over 18,000 Twitter users looking for a way to get their accounts verified have been duped by a single fake account promising to provide the service into visiting a …

US OPM takes vulnerable background investigation portal offline

The US Office of Personnel Management announced on Monday that it has temporarily suspended the E-QIP (Electronic Questionnaires for Investigations Processing) system, a …

Popular VPNs leak data, don’t offer promised privacy and anonymity

Virtual Private Network (VPN) services can be used for circumventing Internet censorship and accessing blocked content, but researchers warn that you shouldn’t believe …

Researcher proves how easy it is to pull off homographic phishing attacks

Security consultant Paul Moore has managed to register a domain that, at first glance, looks like that of UK-based Lloyds Bank, and get a valid TLS certificate for it from …

Worldwide IT spending to decline 5.5 percent in 2015

Worldwide IT spending is on pace to total $3.5 trillion in 2015, a 5.5 percent decline from 2014, according to the latest forecast by Gartner, Inc. Analysts attribute the …

NIST revises security publication on random number generation

In response to public concerns about cryptographic security, the National Institute of Standards and Technology (NIST) has formally revised its recommended methods for …

Don't miss

Cybersecurity news