Please turn on your JavaScript for this page to function normally.
US govt and military email addresses offered for sale

Cyber crooks are very well aware that information is a very lucrative commodity and that every type of information has potential buyers. Take email addresses, for example. …

Europeans targeted with new ransomware

In the last couple of years, malware that hijacks the users’ machines and demands money to “unblock” it has become an often encountered threat. Messages …

Fake LinkedIn emails serve malware

Emails purportedly coming from business-related social network LinkedIn have been hitting inboxes in the last couple of days, ostensibly reminding recipients of invitations …

Packet Guide to Routing and Switching

Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies. …

Week in review: Multifunction printer hacking, new protection mechanisms for IE 10 and most notorious Android malware

Here’s an overview of some of last week’s most interesting news, podcasts, articles and reviews: Multifunction printer hacking In this podcast, Deral Heiland talks …

Working exploit for MS12-020 RDP flaw found

The vulnerability in Microsoft’s Remote Desktop Protocol (RDP) implementation (MS12-020) – a patch for which has been released by during the last Patch Tuesday …

Android banking Trojan steals both authenticating factors

The Zeus and SpyEye banking Trojans have recently been fitted with a new module that targets Android users that use their device as an added authentication method when …

Fake Google Play site serves Android malware

Online scammers are known for their adaptability, so it should not come as a surprise that the recent name change of Google’s official Android Market – now dubbed …

Most notorious Android malware

Total Defense announced the findings of its 2011 Internet Security Threat Intelligence Report, which indicates Android’s rise in market share was only surpassed by the …

Are mobile password apps pointless?

ElcomSoft analyzed 17 popular password management apps available for Apple iOS and BlackBerry platforms, including free and commercially available tools, and discovered that …

Middle East plans to build a cyber-stronghold

The risks and consequences of cyber-attacks are increasing exponentially each day. The computers that control most of the world’s oil and gas production and distribution …

Wi-Fi hotspot testing simplified

Wi-Fi Hotspots are hot. From coffee shops, to airports, to sport venues, to gas stations and Laundromats, they’re springing up everywhere and are projected to grow 350 …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools