Please turn on your JavaScript for this page to function normally.
Smart cities to use 1.1 billion connected things

Increasing urbanization is putting unprecedented pressure on city mayors to constantly balance the challenge of resource constraints against environmental sustainability …

Google aims to make Play Store safer, sets up human app review team

The time has come for Google to add some more hoops for Android app developers to jumpt through in order to get their offering accepted to the Google Play store. The first …

Personal, healthcare info of over 11M Premera customers compromised

US healthcare provider Premera Blue Cross has suffered a data breach that resulted in a potential compromise of personal, financial and health-related information of as many …

Payments via Facebook Messenger soon to be a reality

A few months from now, US-based users of Facebook’s Messenger app will be able to send and receive money via it for free, the company has announced on Tuesday. The …

Many Android and iOS apps still vulnerable to FREAK attacks

Your browser may no longer be vulnerable to FREAK attacks, but what about the mobile apps you use? According to FireEye researchers, who have tested the most popular apps both …

Native Hadoop security tools are not enough

While an overwhelming majority of Hadoop users agree that data security is a critical requirement, most disagree or are not sure that its native security tools provide enough …

The need for information security innovation

The increasing number of connected devices is multiplying the probability of cyberattacks on companies across sectors. This is compelling organizations to adopt cybersecurity …

SSL Labs unveils free open source tool, new APIs

Qualys SSL Labs now includes free assessment APIs, accompanied by a free open source tool that can be used for bulk and automated testing of websites. These new enhancements …

A billion data records leaked in 2014

2014 was the year when “designer vulnerabilities” emerged, when breaches and security incidents were being announced so fast that we struggled to keep up, when old …

Search for vulnerable servers unearths weak, thousands-times repeated RSA keys

A group of researchers from the Information Security Group from Royal Holloway, University of London, wanted to see how many TLS servers still supported the weak, export-grade …

D-Link patches critical flaws in wireless range extender, Wi-Fi cameras firmware

D-Link has released new firmware for its DAP-1320 wireless range extender and the DCS-93xL family of Wi-Fi cameras in order to patch two critical vulnerabilities that can lead …

Deanonymizing Tor users with Raptor attacks

A group of researchers from Princeton University and ETH Zurich have found yet another way to deanonymize Tor users. “There are essentially two ways for an adversary to …

Don't miss

Cybersecurity news