Please turn on your JavaScript for this page to function normally.
Instapaper for Android vulnerable to man-in-the-middle attacks

Bitdefender researchers have discovered that Android app Instapaper is vulnerable to man-in-the-middle attacks that could expose users’ signup/login credentials when logging …

Who fixes the most vulnerabilities?

Web and mobile applications produced or used by government organizations are more likely than those in other industries to fail standard security policies like the OWASP Top …

How lack of trust and limited knowledge impact your organization

There are significant gaps in cybersecurity knowledge, shared visibility and mutual trust between those who serve on organizations’ board of directors and IT security …

Six key facts about malicious macros and the cybercrime economy

“Cybercrime is big business and criminals are increasingly exploiting people to circumvent automated protection systems. Cybercriminals have, in the last nine months, …

Over $18 million lost to Cryptowall just in the US

“Cryptowall is still “the most current and significant ransomware threat targeting US individuals and businesses,” the FBI warned in a public service …

Flash Player 0-day exploited in the wild, patch immediately!

Adobe has released an emergency patch for its notoriously buggy Flash Player software because attackers are actively exploiting a critical vulnerability that can lead to total …

US, UK spies reverse-engineered security software in search for flaws

The UK GCHQ has been actively trying to reverse-engineer popular security software in order find vulnerabilities that can be used to neutralize the protection the software …

HP releases exploit code for IE zero-day that Microsoft won’t patch

Despite having paid $125,000 for information about an Address Space Layout Randomisation (ASLR) vulnerability affecting Internet Explorer, Microsoft has decided against …

Critical RubyGems vulns can lead to installation of malicious apps

A serious vulnerability in RubyGems, a package manager for the Ruby programming language, can be exploited to trick end users into installing malware from attacker-controlled …

OPM hack shines light on abysmal state of US federal systems’s security

With each passing day, newly revealed details about the US Office of Personnel Management (OPM) hack show an ugly picture of the security situation in the OPM, and other US …

How to find a free, secure proxy service?

There are several reasons one might want to use web proxy services, and depending on that reason, it might not be a very good idea to choose a free one randomly.Vienna-based …

Cyber attack grounds Polish LOT aeroplanes

Around 1,400 unlucky travelers who were set to depart from Warsaw’s Frederic Chopin Airport on Sunday had their flights cancelled or delayed for hours, as the computer …

Don't miss

Cybersecurity news