Year-old crypto flaw in Socat created a potentially intentional backdoor
A backdoor has been discovered in Socat, a popular open-source network administration tool similar to Netcat, and its unclear how it hasn’t been spotted earlier or at …
Surprise? Most organizations are not cyber resilient
71 percent of UK organisations would rate their cyber resilience as low today, underlining a lack of preparedness to handle cyberattacks by the majority of UK organisations, …
Reactions to the EU-US Privacy Shield
The European Commission and the United States have agreed on a new framework for transatlantic data flows: the EU-US Privacy Shield. Here are some of the comments Help Net …
Comodo Internet Security installs insecure Chrome-based browser
Google researcher Tavis Ormandy has found more vulnerabilities in yet another security solution. This time it’s Comodo Internet Security and, according to this issue …
Security flaws discovered in smart toys and kids’ watches
Rapid7 researchers have unearthed serious flaws in two Internet of Things devices: The Fisher-Price Smart Toy, a “stuffed animal” type of toy that can interact …
Revelation of security bugs jumpstarts launch of Malwarebytes’ bug bounty program
Malwarebytes CEO Marcin Kleczynski has announced that the company has launched a bug bounty program in an effort to make its software more secure. “The Coordinated …
Google plugs five critical Android vulnerabilities
Google has plugged nine Android security holes with its February Nexus security update. Of these, five are critical, four of high and one of moderate severity. Here’s …
EU-US Privacy Shield: New framework for transatlantic data flows
The European Commission and the United States have agreed on a new framework for transatlantic data flows: the EU-US Privacy Shield. The College of Commissioners approved the …
Severe and unpatched eBay vulnerability allows attackers to distribute malware
Check Point researchers have discovered a severe vulnerability in eBay’s online sales platform, which allows criminals to distribute malware and run phishing campaigns. …
Security and privacy issues plague wearable fitness tracking devices
A new report is describing major security and privacy issues in several leading wearable fitness tracking devices and accompanying mobile applications. The research examined …
Banning encryption is useless when IoT devices can spy on users
For a while now the US intelligence and law enforcement community has been complaining about the rise of end-to-end encryption, and how it will prevent them from tracking …
Hackers claim to have hacked NASA, hijacked one of its drones
AnonSec hackers claim that they have breached a number of NASA’s systems, and they have published a data trove containing video recordings made by the agency’s …
Featured news
Resources
Don't miss
- Windows Notepad Markdown feature opens door to RCE (CVE-2026-20841)
- 1Password open sources a benchmark to stop AI agents from leaking credentials
- Apple fixes zero-day flaw exploited in targeted attacks (CVE-2026-20700)
- When security decisions come too late, and attackers know it
- OpenClaw Scanner: Open-source tool detects autonomous AI agents