Please turn on your JavaScript for this page to function normally.
How important is online privacy?

Consumer online privacy concerns remain extremely high with 92 percent of American internet users worrying to some extent about their privacy online – the same …

Hijacking drones with malware

A recent incident at the White House showed that small aerial vehicles (drones) present a specific security problem. While in this particular case the actual danger turned out …

Multiple vulnerabilities in the FreeBSD kernel code

Francisco Falcon from the Core Exploit Writers Team found multiple vulnerabilities in the FreeBSD kernel code that implements the vt console driver (previously known as …

IBM’s sophisticated cryptographic algorithm protects your identity

IBM researchers revealed plans for a cloud-based technology, called Identity Mixer, that uses a cryptographic algorithm to encrypt the certified identity attributes of a user, …

Threats and technologies of a shifting data security landscape

With every email now a target and every piece of data at risk, the need for data protection maturity has never been higher. According a new study released by Lumension, IT …

IoT security and privacy best practices

In a report on the Internet of Things (IoT), the staff of the Federal Trade Commission recommend a series of concrete steps that businesses can take to enhance and protect …

High severity vulnerability found in Linux GNU C library

The Qualys security research team has found a critical vulnerability in the Linux GNU C Library (glibc), that allows attackers to remotely take control of an entire system …

Evidence shows Regin spy malware is used by Five Eyes intelligence

Kaspersky Lab researchers who have recently analyzed a copy of the malicious QWERTY module have discovered that the malware is identical in functionality to a Regin malware …

Why Google won’t be updating pre-KitKat WebKit anymore

Two weeks ago, Rapid 7 researchers discovered that Google will no longer be providing security patches for WebView used in pre-KitKat (v4.4) Android versions, meaning that …

Supposedly clean Office documents download malware

Bitdefender is warning Microsoft Office users against the emergence of a new spam campaign that is looking to trick antispam filters in order to allow spam to pass freely into …

APT gear: Custom Windows task hiding tool

Cyber attackers, especially persistent ones, use a variety of tools to break into target systems, assure their continuing presence in them and hide their actions, and …

Android Wi-Fi Direct DoS vulnerability discovered

Some Android devices are affected by a Denial of Service attack when scanning for WiFi Direct devices, according to Andres Blanco from the CoreLabs Team. An attacker could …

Don't miss

Cybersecurity news