Metadata-hiding Dark Mail protocol soon to be reality
At the Hackers on Planet Earth X (HOPE X) conference held this weekend in New York, NSA whistleblower Edward Snowden called for hackers, coders and developers to “help …
EFF invites hackers to test, secure its Open Wireless Router
The Electronic Frontier Foundation (EFF) has released Open Wireless Router, an experimental alpha release of wireless router software that is meant to improve some and add new …
Funny Facebook video scam leaves unamusing Trojan
A new funny video spreading on Facebook leaves a not-so-hilarious Trojan in its wake on users’ computers, according to research by Bitdefender. The malware, believed to …
Unpatched OpenSSL holes found on Siemens ICSs
A number of Siemens industrial products have been found sporting four vulnerabilities in their OpenSSL implementation, which could lead to man-in-the-middle (MitM) attacks or …
TRUSTe launches new privacy assessments
TRUSTe expanded its Data Privacy Management Platform to include TRUSTed Assessments, a new privacy assessment solution which addresses the need for specialized tools to …
Week in review: Vulnerable web-based password managers, Mayhem malware, and Google’s Project Zero
Here’s an overview of some of last week’s most interesting news, interviews and articles: Endpoint security myths and why they persist In this interview, Roman …
Mayhem malware ropes Linux, UNIX servers into botnets
A new malware that researchers have dubbed Mayhem is being used to target Linux and Unix web servers and has so far compromised over 1,400 Linux and FreeBSD servers around the …
Fake Flash Player steals credit card information
A new trojan that’s after credit card details is targeting Android users, warn antivirus experts from Dr. Web. The malware is currently targeting Russian users, but it …
Government-grade malware used for ransomware attacks
It was only a matter of time until cyber criminals got their hands on a piece of government-made malware and repurposed it for their own criminal needs. Sentinel Labs …
40% of IT security teams keep executives in the dark
A new survey uncovered the communication challenges between IT security professionals and executives, a desire to overhaul current security systems and limited security …
Are endpoints the most vulnerable part of the network?
Only 39% of companies have advanced endpoint security protections in place even though 74% consider endpoints to be “most vulnerable” to a cyber-attack, and 76% …
Acunetix offers free network security scan
Acunetix is offering 10,000 free network security scans with Acunetix Online Vulnerability Scanner in a bid to make it easier for businesses to take control of their network …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform