Please turn on your JavaScript for this page to function normally.
Gemalto announces investigation of massive SIM heist

Yesterday’s report by The Intercept hit the information security community like a ton of bricks, as a set of documents from Edward Snowden’s trove indicate that …

Over 250,000 home routers sport same SSH keys, warns researcher

With a simple search, John Matherly, the creator of Shodan, has discovered with it more than 250,000 routers that share the same SSH key, meaning they also share the same …

Google’s new Cloud Security Scanner detects common security bugs

Here’s some good news for Google App Engine developers: Google has released a new application security scanner that’s especially fitting to test new app builds for …

How to wipe Superfish adware and offending cert from your Lenovo laptop

After the recent revelation that Lenovo has been shipping some of it laptops with pre-installed adware that’s also breaking the security of secure connections by using …

Don’t wait until you’re attacked to take cybersecurity seriously

CISOs foresee cyber terrorism and cybercrime posing significant risks to their organizations over the next three years, according to Raytheon and the Ponemon Institute. The …

How cybercriminals hack our brains

Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually resulting in the loss of money …

Cyber readiness across government and critical infrastructure industries

While the frequency and severity of cyberattacks against organizations are on the rise, a majority of IT leaders do not feel confident in their leaderships’ ability to …

AT&T: Pay more if you don’t want to share data for personalized ads

If you are a customer of AT&T’s GigaPower fiber-optic Internet access service and you don’t want to see personalized ads based on your browsing history, …

New Android Trojan fakes device shut down, spies on users

A new Android Trojan that tricks users into believing they have shut their device down while it continues working, and is able to silently make calls, send messages, take …

Darkleaks: An online black market for selling secrets

Whistleblowers and those individuals that are simply out to make a buck out of any confidential and valuable information, can now offer it for sale on Darkleaks, a …

Lenovo computers come with pre-installed adware and MITM proxy

If you have recently bought a new Lenovo computer, you’re in for a nasty surprise: the company has been shipping them with pre-installed adware. And, what’s even …

Lepide Exchange Recovery Manager 15.0 released

Lepide Software released version 15.0 of Lepide Exchange Recovery Manager. The latest version allows users to add Office 365 as Source directly in Lepide Exchange Recovery …

Don't miss

Cybersecurity news