26 vulnerabilities found in parental monitoring application
A new Citizen Lab report details results of two independent audits of the privacy and security of Smart Sheriff, a parental monitoring application that has been promoted by …
Symantec fires employees who issued rogue Google certificates
Symantec has fired several employees that have been involved in the issuing of rogue certificates for some Google domains.“We learned on Wednesday that a small number of …
The average budget required to recover from a security breach
The average budget required to recover from a security breach is $551,000 USD for enterprises, and $38,000 for small and medium businesses according to Kaspersky Lab.Based on …
Why improving cyber resilience is key
75 percent of U.S. organizations are not prepared to respond to cyberattacks, leaving them more vulnerable than ever against increasing intensity and volume of security …
Cyber risk still poorly communicated to C-suite executives
Cyber risk continues to be poorly communicated to C-suite executives, according to Auriga Consulting. The monopolisation of the risk management function by IT and security …
Week in review: Malicious Cisco router implants, .onion becomes a special-use domain name, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, reviews and articles:(IN)SECURE Magazine issue 47 released(IN)SECURE Magazine is a free digital …
Millions of iOS users endangered by Trojanized apps from the App Store
“Unknown malware pushers have managed to trick Apple into offering for download from the company’s official App Store a considerable number of malicious apps …
D-Link accidentally leaks code-signing certs in its firmware
Malware peddlers don’t always have to steal or buy (from sellers on underground forums) legitimate and valid code-signing certificates to sign their malware with – …
Critical Bugzilla flaw allows access to unpatched vulnerability information
Mozilla has patched a critical vulnerability (CVE-2015-4499) in its popular open source bug-tracking Bugzilla software – a vulnerability that can be exploited by …
Information security: A key issue in the 2016 U.S. presidential campaign?
As the number and scale of data breaches continue to grow, cybersecurity issues are becoming part of our national discourse. The topic is already a key issue for the 2016 …
State-sponsored cyberattacks linked to Russian intelligence gathering
F-Secure Labs linked a number of state-sponsored cyberattacks to a hacking group engaged in Russian intelligence gathering. Specific targets of the attacks include the former …
Malicious SYNful Cisco router implant found on more devices around the globe
“After FireEye researchers published on Tuesday their discovery of 14 Cisco routers in India, Mexico, Philippines and Ukraine that have been implanted with a modified, …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)