GPG development will continue as donations pour in
An article by Julia Angwin on ProPublica has become the catalyst for an avalanche of much needed donations for the survival of Gnu Privacy Guard (GPG), a free email encryption …
Gamers, beware of fake in-game communication apps
Online gamers are often targeted by cyber thieves, as their game accounts hold coveted items and/or funds to buy them. In order to gain access, the crooks usually set up …
Anthem breach dates back to December
As more details about the Anthem data breach come to light, sources close to the investigation say that Chinese state-sponsored hackers might be behind the attack. Steve Ragan …
Investigating online dating fraud
The one thing that online dating scammers have in common is that their preferred target demographic is vulnerable and trusting people with a limited social circle or support …
Analysis of 2014 Microsoft patch trend data
Tripwire announced an analysis of Microsoft patch data from 2014. “The 2014 data clearly shows that Microsoft is packing in more CVEs per bulletin in 2014,” said …
Reactions to the extensive Anthem data breach
Anthem, the second-largest health insurer in the United States, has suffered a data breach that may turn out to be the largest health care breach to date, as the compromised …
Adobe patches latest Flash Player zero-day
Adobe has released Flash Player 16.0.0.305, a new version that fixes the latest zero-day flaw (CVE-2015-0313) that is currently exploited in mass malvertising campaigns. An …
Ross Ulbricht is Dread Pirate Roberts, risks life imprisonment
After deliberating for three and a half hours, a jury has found Ross Ulbricht guilty of all seven counts he was accused of, which means he could potentially spend the rest of …
US health insurer Anthem suffers massive data breach
Anthem, the second-largest health insurer in the United States, has suffered a data breach that may turn out to be the largest health care breach to date, as the compromised …
Infographic: The state of enterprise security
This infographic by SysCloud features cyber security trends in the enterprise and showcases how data breaches in the enterprise can be prevented. Click on the image below for …
iOS spyware used by Pawn Storm cyber spies
Trend Micro researchers have unearthed two variants of a spyware specially designed for targeting devices running iOS, and at least one of them can be installed on …
Canarywatch: Keeping track of warrant canaries
In the post-Snowden world, the term “warrant canary” – indicating a method used by some communications service providers to let their users know that they …
Featured news
Resources
Don't miss
- GitHub project maintainers targeted with fake security alert
- Pay, fight, or stall? The dilemma of ransomware negotiations
- Review: Cybersecurity Tabletop Exercises
- IntelMQ: Open-source tool for collecting and processing security feeds
- Quantifying cyber risk strategies to resonate with CFOs and boards