Please turn on your JavaScript for this page to function normally.
Set up email encryption in half an hour

As part of the global Reset the Net action, the Free Software Foundation, a non-profit organization that promotes computer user freedom and aims to defend the rights of all …

OpenSSL releases patches for critical MITM, code execution flaws

OpenSSL users, you need to patch again. The OpenSSL team released a security update that fixes 6 vulnerabilities, two of which could be considered critical. The first one is …

Comcast will start encrypting email to and from Gmail accounts

Google’s unveiling of a new section to its Transparency Report that, among other things, shows which services support encryption in transit, has quickly lead to another …

Estimating the cost of a cloud data breach

IT and security professionals expect cloud services to multiply the likelihood and economic impact of data breaches as they pervade the enterprise. They also reveal that the …

Why Anonymous threats should not be ignored

International hacktivist group Anonymous is causing fear within the business and technology community once again, after a supposed Anonymous spokesperson warned that World Cup …

Most IT admins fear exposure through mobile devices

GFI Software announced the findings of an extensive independent research project examining the “Internet of Things” (IoT) and the impact IT administrators expect …

Who is the world’s most dangerous footballer?

Portugal’s Cristiano Ronaldo just barely edges out Argentina’s Lionel Messi as the world’s riskiest football player to search for online. According to …

Global UTM and NGFW market to reach $5.32 billion in 2018

The dynamic nature of security threats and network traffic has challenged the efficacy of legacy firewall systems, paving the way for next generation firewalls (NGFW) and …

Relations between spam landscape actors can be leveraged for detection

Since late 2012, a group of researchers from UC Santa Barbara and RWTH Aachen University has been working on finding out the relations that exist between the different actors …

ESET analyzes first Android file-encrypting, TOR-enabled ransomware

One year ago, Android Defender, a hybrid comprising characteristics of a rogue AV and ransomware (the lockscreen type, not a file-encryptor) was discovered. Last month we saw …

Google unveils source code for Chrome encryption extension

Google has made publicly available the source code for a new Chrome extension that helps users encrypt, decrypt, digitally sign, and verify signed messages within the browser …

Why botnet takedowns can cause more harm than good

Zeus is a well-known and highly successful crimeware kit – the flat-pack furniture of the virus world. It is under constant development by several criminals or groups …

Don't miss

Cybersecurity news