Please turn on your JavaScript for this page to function normally.
HDD
Attacking hard disk drives using ultrasonic sounds

Another group of researchers has demonstrated that hard disk drives (HDDs) can be interfered with through sound waves, but they’ve also shown that ultrasonic signals …

Android apps
Cryptomining apps are on the rise, malicious apps in app stores decline

RiskIQ analyzed 120 mobile app stores and more than two billion daily scanned resources. The findings showed that taking advantage of the popularity and volatility of the …

alert
DHS, FBI warn about malware tied to North Korean threat actor

US-CERT has released a new technical alert on malware used by Hidden Cobra, a threat actor whose activities they believe to be directed by the North Korean government. The …

Qualys CertView
Make certificate visibility and security a part of your overall security program

In this podcast recorded at RSA Conference 2018, Asif Karel, Director of Product Management at Qualys, illustrates why certificate visibility and security should not just be …

city
Smart cities: New threats and opportunities

As smart cities integrate connected technologies to operate more efficiently and improve the quality of city services, new vulnerabilities arise that require diligent …

network
Network Critical launches SmartNA-PortPlus, a Packet Broker for ultimate scalability

Network Critical announced SmartNA-PortPlus. This latest Packet Broker is a high density, high performance solution with up to 192 Ports covering 1/10/25/40/100G speeds. It …

Trojan
BackSwap Trojan exploits standard browser features to empty bank accounts

Creating effective and stealthy banking malware is becoming increasingly difficult, forcing malware authors to come up with innovative methods. The latest creative burst in …

Facebook 2FA
Facebook now supports 2FA via authenticator apps

Facebook has good news for users who wish to secure their accounts with two-factor authentication but aren’t comfortable sharing their phone number with the social …

risk
Quantifying cyber exposure: Attackers are racing ahead

Cybercriminals have a median seven-day window of opportunity during which they can exploit a vulnerability to attack their victims, potentially siphoning sensitive data, …

abstract
CIOs are forced to compromise between faster innovation and perfectly working software

An independent global survey of 800 CIOs revealed that 73% of organizations say the need for speed in digital innovation is putting customer experience at risk. The study …

abstract, generic
Week in review: VPNFilter, hacking BMW cars, verifying data processing for privacy and GDPR

Here’s an overview of some of last week’s most interesting news and articles: The percentage of open source code in proprietary apps is rising The number of open …

Microsoft
Microsoft will extend GDPR rights to customers worldwide

Microsoft has announced it will extend the rights that are at the heart of GDPR to all of their consumer customers worldwide. “Known as Data Subject Rights, they include …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools