Russian hackers executed the US State Department, White House network breaches
The October 2014 breaches of some of the computer systems of the US State Department and the White House have been executed by Russian hackers, unnamed US officials familiar …
Large malvertising campaign linked to potentially compromised Google ad reseller
Dutch infosec firm Fox IT has spotted a lage scale malvertising campaign that seems to originate from Bulgarian Google ad reseller EngageLab. The first redirection has been …
New Tor version fixes issues that can crash hidden services and clients
Two new versions of the Tor anonymity software have been released on Tuesday, with fixes for two security issues that can be exploited to crash hidden services and clients …
Malware peddlers exploit fear of Android Installer Hijacking bug
The recently disclosed existence of the “Android Installer Hijacking” vulnerability is being exploited by malware and adware peddlers and online survey scammers, …
Guide outlines specifications of smart card-based PACS
Smart cards are increasingly accepted as the credential of choice for securely authenticating identity, determining appropriate levels of information access and controlling …
Are you prepared for dealing with a breach?
RSA, The Security Division of EMC, released the results of a new global breach readiness survey that covered thirty countries and compared those global results with a survey …
IoT devices facilitate robbery, stalking and cybercrime
The foundation of the Internet of Things (IoT) – the devices themselves plus their associated mobile applications and cloud services – are often not designed with …
CSA to hold hackathon featuring $10,000 prize
The Cloud Security Alliance (CSA) will hold its third Hackathon at the RSA Conference 2015 in San Francisco, to continue to test the CSA Software Defined Perimeter …
Firefox loses opportunistic encryption feature due to critical flaw
Less than a week after it made Firefox 37 available for download, Mozilla is pulling one of the security features it implemented. Mozilla is urging users to update again, to …
New crypto-ransomware “quarantines” files, downloads info-stealer
Trend Micro researchers have found and analyzed a new piece of crypto-ransomware: CryptVault encrypts files, makes them look like files quarantined by an AV solution, asks for …
How to keep your Facebook account secure
When last November Facebook asked users to comment the proposed changes to the social network’s terms of use, data policy, and cookies policy, it also introduced Privacy …
Snapchat blocks third-party apps from accessing its APIs
Snapchat has had its fair share of data breaches and security troubles, the latest of which stemmed from the fact that the app’s internal API has been reverse-engineered …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance