Please turn on your JavaScript for this page to function normally.
System failures cause most large outages of communications services

The European Union Agency for Network and Information Security (ENISA) published a report about large-scale outages in the electronic communication sector. It provides an …

Researcher creates exploit for compromising scammers’ computers

Even if you never had to deal personally with “Windows support” scammers, chances are someone you know did or you have heard about these type of scams. These …

Google Apps scripts can be easily misused by scammers

Andrew Cantino, VP of Engineering at Mavenlink but also a bug hunter in his free time, has discovered that Google Apps Scripts can be misused by attackers to access …

Freenode suffers breach, asks users to change their passwords

Popular IRC network Freenode has suffered a security breach and is asking users to change their passwords, as they might have been compromised. “Earlier today the …

Dragonfly malware targeting pharmaceutical companies

The recently revealed Dragonfly (Havex) malware is likely targeting the pharmaceutical sector, not the energy sector as previously believed, according to Belden. Until now, …

Video: Reactions of engineers under GCHQ surveillance

Filmmakers Katy Scoggin and Laura Poitras follow reporter Marcel Rosenbach as he informs the staff of a German communications firm that they have been targeted for …

Best practices for skimming prevention

The PCI Security Standards Council released an update to its guidance for merchants on protecting against card skimming attacks in POS environments. Card skimming continues to …

75% of mobile apps will fail basic security tests

Through 2015, more than 75 percent of mobile applications will fail basic security tests, according to Gartner. Enterprise employees download from app stores and use mobile …

Week in review: Security experts discuss Apple Pay, Salesforce hit with targeted attack

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Mobile forensics in a connected world In this interview, Andrew …

Home Depot and Target attackers likely not the same

More details about the malware used in the Home Depot breach have surfaced, and it seems that, after all, it wasn’t the one used in the Target breach (BlackPOS). …

Yahoo’s fight against US govt secret surveillance revealed

Unsealed documents from Yahoo’s challenge to the expansion of US surveillance laws in 2007 and 2008 have shown how the company was ultimately made to comply to the US …

Everything you need to know about POS malware

With this year’s dramatic uptick in data breaches targeting retailers and restaurant chains and, more specifically, the payment card data they process every day, …

Don't miss

Cybersecurity news