Man gets 50 months in prison hacking U.S.-based financial institutions
Qendrim Dobruna, a member of an international cybercrime syndicate, was sentenced to 50 months’ imprisonment and restitution in the amount of $14 million for his role in …
Hacking Team hacked, 400GB+ of company documents and emails leaked
Hacking Team, the (in)famous Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies around the …
Week in review: Popular VPNs leaking data, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles:5 ways to stop the Internet of Things from becoming the Internet of ThievesThis is the …
Mastercard is trying out purchase verification with selfies
Five hundred US MasterCard users will soon be testing out the company’s new system for quickly processing of digital payments, without having to input a PIN or …
How you can anonymously use public Wi-Fi from miles afar
Benjamin Caudill, founder of Rhino Security Labs, is scheduled to demonstrate at the upcoming DefCon a new device that could help users achieve and maintain their online …
Plex forums hacked: IPs, private messages, encrypted passwords compromised
Users of Plex’s forums are being forced to change their password in wake of a breach that resulted in the compromise of some of their private information, including …
The top three banking malware families
“The primary motivator behind banking malware attacks is to capture credentials, financial data, and personal information from employees, and partner company employees, …
Amazon releases new, easily auditable TLS implementation
A new, open source implementation of the TLS encryption protocol has been unveiled by Amazon Web Services.Dubbed s2n (shorthand for “signal to noise”), the library …
Harvard University suffers IT security breach
Discovered on June 19, the intrusion was first spotted on the Faculty of Arts and Sciences and Central Administration information technology networks, but a subsequent …
Cloned, booby-trapped Dark Web sites steal bitcoins, login credentials
Someone is cloning .onion sites, and using the clones to intercept user traffic and offer modified content.“I noticed a while ago that there is a clone onion site for …
How safe is the Windows 10 Wi-Fi sharing feature?
A feature that went almost unnoticed in Windows Phone 8.1 because of its modest installation base has been raising security questions now that it has been added to Windows …
A closer look into the piracy ecosystem
Illegal reproduction and distribution of copyrighted material on the Web is booming as a result of security breaches in both mobile and desktop software applications.Arxan and …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous