Please turn on your JavaScript for this page to function normally.
Thousands of Mozilla developers’ emails, passwords exposed

Email addresses and encrypted passwords of tens of thousands of Mozilla developers were accidentally exposed and might have been harvested by malicious individuals, Stormy …

Week in review: Malicious USB device firmware, insecure IoT devices, and using Hollywood to improve your security program

Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: What influences corporate security strategies? Sixty eight …

Competition to crack a virtual terrorist HDD, break into CCTV systems

Sophos is calling amateur security talent to turn sleuth and to investigate confiscated crime scene computer systems belonging to a cyber terrorist group as part of the latest …

Retailers warned of attacks using hard-to-spot PoS malware

Retailers, beware: cyber crooks are increasingly targeting remote desktop applications by brute-forcing passwords, and are using that access to plant hard-to-detect PoS …

CIA chief admits agency employees hacked Senate computers

CIA Director John Brennan has confirmed that five CIA employees have, indeed, “improperly accessed” computers of Senate staffers and the computer network that was …

Reactions to the Paddy Power data breach

Paddy Power is contacting 649,055 customers in relation to a data breach from 2010. The historical dataset contained individual customer’s name, username, address, email …

Microsoft releases EMET 5.0

Microsoft has released version 5.0 of its Enhanced Mitigation Experience Toolkit (EMET), a free utility that uses a number of security mitigation techniques to prevent the …

Top 10 Facebook scams

American singer and actress Taylor Swift has lost her scam mojo, as her fake sex tape spreading on Facebook was excluded from the top ten most successful scams, according to …

Do CISOs deserve a seat at the leadership table?

ThreatTrack Security published a survey study of C-level executives that underscores a hotly-debated topic in executive circles: what is the role of the CISO? “The …

Malicious USB device firmware the next big infection vector?

Researchers from German security consultancy SR Labs have created a whole new class of attacks that can compromise computer systems via ubiquitous and widely used …

Security contest rewards builders of secure systems

More often than not, computer security competitions come in the form of Capture The Flag (CTF) contests, and the emphasis is on breaking systems. This approach helps defenders …

BitTorrent’s decentralized chat app keeps content, metadata safe

BitTorrent, the company that develops the eponymous peer-to-peer protocol and two popular clients that use it, has announced the release of Bleep, an online communication …

Don't miss

Cybersecurity news