>>> BLACK FRIDAY 2025 cybersecurity deals to explore <<<

Please turn on your JavaScript for this page to function normally.
Will 2016 mark the end of the Advanced Persistent Threat?

Advanced Persistent Threats (APTs) as we know them will cease to exist in 2016, replaced by deeper, embedded attacks that are harder to detect and trace back to the …

Anonymous goes after ISIS, aims to expose recruiters and sympathizers

On Friday, the 13th of November, a slew of coordinated attacks executed by ISIS terrorists in Paris has resulted in the death of over 120 people in cafes, restaurants, a …

Unsafe password policies leave shoppers vulnerable

Dashlane examined password security policies on 25 of the most popular online retailers. They tested 22 criteria, and each criterion was given a +/- point value that enabled a …

9271 crucial vulnerabilities found in 185 firmware images of embedded devices

A study into the security of the Internet of Things has confirmed that the web interfaces for user administration of commercial, off-the-shelf embedded devices – …

Cyber crooks actively hijacking servers with unpatched vBulletin installations

Administrators of vBulletin installations would do well to install the latest vBulletin Connect updates as soon as possible, as cyber crooks are actively searching for servers …

Cross-device tracking via imperceptible audio beacons threatens user privacy

As consumers use multiple devices through the day, and tracking cookies become increasingly less effective, the advertising industry is looking for new ways to track …

Bug in Android Gmail app allows effective email spoofing

Yan Zhu, a Technology Fellow at the Electronic Frontier Foundation, has unearthed a flaw in the Gmail Android app that can lead to very effective phishing attacks.The flaw is …

Phishers are targeting millions of DHL customers

As the end-of-the-year holidays are quickly approaching, people are starting to order more things (read: gifts for themselves and loved ones) online so that they can avoid the …

BadBarcode: Poisoned barcodes can be used to take over systems

Researchers from Tencent’s Xuanwu Lab have proved that a specially crafted barcode can be used to execute commands on a target system, saddle it with malware, or perform …

Google debuts customized warning for social engineering sites

Google Chrome users will from now on be faced with a new, customized warning every time they visit a website/page that contains social engineering content:“The threat …

How businesses interpret and use threat intelligence

A new IDC study of 300 large UK companies found that: 96% of UK firms already use threat intelligence products and services; all of those surveyed intend to do so within the …

Week in review: Linux ransomware, university researchers unmask Tor users, and how one man changed the way we understand SSL

Here’s an overview of some of last week’s most interesting news and articles:Ivan Ristic and SSL Labs: How one man changed the way we understand SSL“When I …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools