Over $18 million lost to Cryptowall just in the US
“Cryptowall is still “the most current and significant ransomware threat targeting US individuals and businesses,” the FBI warned in a public service …
Flash Player 0-day exploited in the wild, patch immediately!
Adobe has released an emergency patch for its notoriously buggy Flash Player software because attackers are actively exploiting a critical vulnerability that can lead to total …
US, UK spies reverse-engineered security software in search for flaws
The UK GCHQ has been actively trying to reverse-engineer popular security software in order find vulnerabilities that can be used to neutralize the protection the software …
HP releases exploit code for IE zero-day that Microsoft won’t patch
Despite having paid $125,000 for information about an Address Space Layout Randomisation (ASLR) vulnerability affecting Internet Explorer, Microsoft has decided against …
Critical RubyGems vulns can lead to installation of malicious apps
A serious vulnerability in RubyGems, a package manager for the Ruby programming language, can be exploited to trick end users into installing malware from attacker-controlled …
OPM hack shines light on abysmal state of US federal systems’s security
With each passing day, newly revealed details about the US Office of Personnel Management (OPM) hack show an ugly picture of the security situation in the OPM, and other US …
How to find a free, secure proxy service?
There are several reasons one might want to use web proxy services, and depending on that reason, it might not be a very good idea to choose a free one randomly.Vienna-based …
Cyber attack grounds Polish LOT aeroplanes
Around 1,400 unlucky travelers who were set to depart from Warsaw’s Frederic Chopin Airport on Sunday had their flights cancelled or delayed for hours, as the computer …
New password recovery scam hitting Gmail, Outlook and Yahoo Mail users
A simple yet ingenious scam is being used by scammers to compromise accounts of Gmail, Outlook and Yahoo Mail users, Symantec researcher Slawomir Grzonkowski warns.“To …
Open source security projects get $452,000 from the Linux Foundation
The Core Infrastructure Initiative (CII), a project managed by The Linux Foundation that enables technology companies, industry stakeholders and esteemed developers to …
Many popular Android apps fail to encrypt login credentials
Using encryption to protect mobile traffic and especially the exchange of credentials between the user and company servers should be a must in this day and age. Unfortunately, …
Week in review: Rethinking security, LastPass breach, and stronger data protection rules for Europe
Here’s an overview of some of last week’s most interesting news, podcasts and articles:How data-centric security worksIn this podcast recorded at Infosecurity …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits