Please turn on your JavaScript for this page to function normally.
Easily exploitable Drupal bug can lead to total site compromise

Admins of sites that run Drupal 7 are advised to update to the latest version of the platform – version 7.32 – because it fixes a critical SQL injection …

New OpenSSL updates fix POODLE, DoS bugs

The OpenSSL Project has pushed out new releases of the popular eponymous open-source cryptographic library, which fix four serious vulnerabilities, including the POODLE …

Facebook doubles bounties for bugs in ads code

Facebook has announced that all vulnerabilities affecting the company’s ads code will now be worth twice as much to the bug hunters who find and responsibly disclose …

Tips for mitigating the financial impact of identity theft

With a number of large retailers and banks reporting massive data security breaches in the last year, leaving hundreds of millions of consumers’ personal information …

McAfee Next Generation Firewall integrates with key technologies

McAfee, part of Intel Security, announced the latest release of McAfee Next Generation Firewall, which now integrates with several key McAfee solutions and technologies, …

Cyber security coalition aims to change the game against malware

It’s good to see that “collaboration” is not just an empty word for the cyber security industry. Novetta Solutions announced it is leading a cyber security …

Microsoft patches two more 0-days actively used by attackers

With this month’s Patch Tuesday, Microsoft has provided patches for several critical vulnerabilities that allow remote code execution, some of which have been or are …

Lessons learned developing Lynis, an open source security auditing tool

If you’ve been involved with information security for more than a decade, you’ve probably heard of Rootkit Hunter or rkhunter, a software whose primary goal is to …

4 million UPnP devices may be vulnerable to attack

Akamai has observed the use of a new reflection and amplification DDoS attack that deliberately misuses communications protocols that come enabled on millions of home and …

POODLE vulnerability: The end of life of SSL 3.0

There is a critical security vulnerability in SSL 3.0 which allows attackers to calculate the plaintext of encrypted connections, and it will likely spell the end of the use …

Infographic: How to spot a phish

Since many cyber attacks originate with a phishing email, the best way for organizations and individuals to protect themselves online is to identify and avoid phishing emails. …

New Linksys switch compliments WRT router

Linksys announced the Linksys WRT 8-Port Gigabit Ethernet Switch (SE4008), the first in a lineup of new networking peripherals made to complement the Linksys Wireless-AC Dual …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools