Please turn on your JavaScript for this page to function normally.
Beware of online dangers lurking this Cyber Monday

Cyber Monday is often regarded as the beginning of the holiday shopping season, but many vendors are rolling out deals early as to entice online users to visit their web sites …

Open source crypto server for thwarting malicious insiders

Edward Snowden’s successful exfiltration of mountains of data from NSA systems and databases has once more put the spotlight back on the threat that insiders pose to …

$1M lost in attack against Bitcoin Internet Payment Services

Copenhagen-based Bitcoin Internet Payment Services (BIPS) has been hit with a DDoS attack and has had 1,295 BTC stolen (a little over $1M) mostly from the company’s own …

AutoCAD malware paves the way for future attacks

A piece of malware masquerading as an AutoCAD component with the goal of making systems vulnerable to later exploits has been analyzed by Trend Micro researchers. Unlike the …

The rise of unsolicited and malicious emails

October saw spammers exploiting the themes of upcoming holidays, the names of well-known telecommunication service providers and the conflict in Syria, according to Kaspersky …

F-Secure launches KEY, a secure password manager

F-Secure Key safely stores your passwords, user names and other credentials so that you can access them wherever you are through one master password. Your personal data is …

BYOD is an applications strategy, not just a purchasing policy

Bring your own device (BYOD) is not just a purchasing policy and needs to be approached more broadly with the applications and strategies designed for today’s world, …

Facebook “flaw” discloses users’ private friends list

A recently unearthed potential Facebook security vulnerability can turn out to be a boon for stalkers or social engineers trying to get their friendship request accepted by a …

Cyber Monday security tips for businesses

Security experts at Neohapsis have put together the following tips to help keep businesses safe. 1. Use HTTPS – Remind employees to use HTTPS to make sure all data …

Do large companies follow encryption best practices?

Following last month’s revelations of the existence of the MUSCULAR program, in which the NSA and the British GCHQ have collaborated in tapping the overseas fiber-optic …

Lavabit founder submits final arguments in potentially game-changing privacy case

The saga surrounding secure email provider Lavabit and its legal fight against the US government continues with a reply brief filed last Friday by the former, arguing that …

Documentary: Buying guns and drugs on the deep web

Motherboard used the deep web to find out just how easy it was to buy guns, drugs, and other contraband online. VICE Germany editor Tom Littlewood talks with cryptology …

Don't miss

Cybersecurity news