Please turn on your JavaScript for this page to function normally.
A month after Heartbleed, many servers are still vulnerable

A month has passed since the existence of the OpenSSL Heartbleed bug has been shared with the public. Given that this open-source implementation of the SSL and TLS protocols …

Snapchat promises of disappearing messages were false

Snapchat, the developer of a popular mobile messaging app, has agreed to settle Federal Trade Commission charges that it deceived consumers with promises about the …

Twitter makes password reset easier, account hijacking harder

Twitter has announced two changes aimed at helping protect user accounts and restore access to them. The company said that they are aware that many people reuse the same …

Microsoft to release eight bulletins on Tuesday

Tuesday, May 13 marks the next Microsoft security patch release. This release will contain eight bulletins, which is the most in a single release so far this year. The good …

Bitly resets compromised credentials

URL shortening service Bitly has suffered a breach of yet undefined proportions, and it seems that Bitly account credentials have been compromised. Even though there is no …

Epidemic of unknown malware on enterprise networks

Check Point has issued a report uncovering the major security events that occurred and impacted organizations across the world in 2013. The report is based on analysis of …

Key trends in cloud usage, risks and malware

Skyhigh Networks released the third edition of its quarterly Cloud Adoption and Risk Report. “With this report, we uncovered trends beyond the presence of shadow IT in …

Are rogue employees the biggest threat to information security?

Rogue employees continue to be the biggest threat to information security, according to 37% of IT professionals polled by BSI at Infosecurity Europe 2014. The poll …

US tech giants urge FCC to protect net neutrality

As the moment when the Federal Communication Commission (FCC) will decide the future of net neutrality draws near, over 100 Internet companies have sent an open letter to the …

Small businesses targeted with email-borne exploits

Even though the data gathered by Microsoft points to the fact that cybercriminals now prefer deceptive tactics to exploits, it does not mean that the latter approach has been …

Malware peddlers prefer deceptive tactics to exploits

Cyber crooks are losing interested in exploits as an attack vector, and are concentrating on deceptive downloads and ransomware as a means of earning/stealing money. The trend …

The prime target for malicious emails

In the first quarter of 2014 spammers started imitating messages from mobile applications. They especially like the popular mobile messengers – WhatsApp, Viber and …

Don't miss

Cybersecurity news