Gemalto announces investigation of massive SIM heist
Yesterday’s report by The Intercept hit the information security community like a ton of bricks, as a set of documents from Edward Snowden’s trove indicate that …
Over 250,000 home routers sport same SSH keys, warns researcher
With a simple search, John Matherly, the creator of Shodan, has discovered with it more than 250,000 routers that share the same SSH key, meaning they also share the same …
Google’s new Cloud Security Scanner detects common security bugs
Here’s some good news for Google App Engine developers: Google has released a new application security scanner that’s especially fitting to test new app builds for …
How to wipe Superfish adware and offending cert from your Lenovo laptop
After the recent revelation that Lenovo has been shipping some of it laptops with pre-installed adware that’s also breaking the security of secure connections by using …
Don’t wait until you’re attacked to take cybersecurity seriously
CISOs foresee cyber terrorism and cybercrime posing significant risks to their organizations over the next three years, according to Raytheon and the Ponemon Institute. The …
How cybercriminals hack our brains
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually resulting in the loss of money …
Cyber readiness across government and critical infrastructure industries
While the frequency and severity of cyberattacks against organizations are on the rise, a majority of IT leaders do not feel confident in their leaderships’ ability to …
AT&T: Pay more if you don’t want to share data for personalized ads
If you are a customer of AT&T’s GigaPower fiber-optic Internet access service and you don’t want to see personalized ads based on your browsing history, …
New Android Trojan fakes device shut down, spies on users
A new Android Trojan that tricks users into believing they have shut their device down while it continues working, and is able to silently make calls, send messages, take …
Darkleaks: An online black market for selling secrets
Whistleblowers and those individuals that are simply out to make a buck out of any confidential and valuable information, can now offer it for sale on Darkleaks, a …
Lenovo computers come with pre-installed adware and MITM proxy
If you have recently bought a new Lenovo computer, you’re in for a nasty surprise: the company has been shipping them with pre-installed adware. And, what’s even …
Lepide Exchange Recovery Manager 15.0 released
Lepide Software released version 15.0 of Lepide Exchange Recovery Manager. The latest version allows users to add Office 365 as Source directly in Lepide Exchange Recovery …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption