New authenticated encryption algorithm is resistant to multiple misuse
Nippon Telegraph and Telephone Corporation, Mitsubishi Electric Corporation and the University of Fukui have jointly developed an authenticated encryption algorithm offering …
Week in review: Target breach reaction fail, WordPress sites exploited in DDoS attack
Here’s an overview of some of last week’s most interesting news, podcasts, videos, interviews and articles: Latvia establishes a Cyber Defence Unit The newly …
“Malaysian Airlines flight MH370 found” video is a scam
Cyber scammers are misusing the public’s interest in the fate of the recently disappeared plane on Malaysia Airlines flight MH370 to lure users into filling in online …
Target failed to act on malware alerts and signs of breach
The massive Target data breach could have easily been prevented if only its IT team had the good sense to thoroughly check out the alerts it received from the $1.6 million …
Tax-related identity theft will rise
Tax-related identity theft has been on the rise for years and the ITRC predicts it won’t be slowing down in 2014. The Javelin Strategy & Research 2014 Identity …
Pwn2Own 2014 ends, $850k distributed to successful hackers
Day two of the Pwn2Own hacking contest at the CanSecWest Conference in Vancouver has ended with Safari, Internet Explorer, Firefox, Chrome and Flash going down. The Vupen team …
Beware of well-executed Google Docs phishing scam
An extremely convincing phishing spam campaign is currently targeting Google Docs and Google Drive users. It all starts with an email that tells potential victims that an …
GFI WirelessSentry brings Wi-Fi management to SMBs
GFI Software unveiled GFI WirelessSentry (GFI WiSe), a cloud-based solution designed to allow IT administrators to monitor, manage and secure their wireless networks. GFI WiSe …
Backdoor in Samsung Galaxy devices discovered
The developers of Replicant, a “fully free/libre version of Android”, have discovered a backdoor in a number of Samsung Galaxy devices that could allow attackers …
Record prizes for Pwn2Own and Pwnium contestants
The results of the first day of the traditional Pwn2Own hacking contest at the CanSecWest Conference currently taking place in Vancouver are in, and the losers are Adobe, …
EC-Council discloses hack of customer email accounts
The International Council of Electronic Commerce Consultants (EC-Council), an organization that provides training and certifications for security professionals, has finally …
Rbrute Trojan hacks Wi-Fi routers to help spread Sality
Researchers from Russian AV company Dr. Web have recently analyzed a Trojan that hacks Wi-Fi routers in order to facilitate the spreading of the infamous Sality malware …
Featured news
Resources
Don't miss
- How neighbors could spy on smart homes
- How the City of Toronto embeds security across governance and operations
- Hottest cybersecurity open-source tools of the month: October 2025
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI
- Sanctions won’t stop cyberattacks, but they can still “bite”