- Editorials
- By Catalin Cimpanu
- October 16th, 2016
XMPP, Tor, and Other Initiatives to Secure the Internet of Things
Legislators, security companies turn their sights on IoT
- Editorials
- By Catalin Cimpanu
- September 26th, 2016
New Open Source Linux Ransomware Shows Infosec Community Divide
Security researchers can't decide if publishing open-source ransomware on GitHub is a bad or a good idea
- Editorials
- By Catalin Cimpanu
- May 30th, 2016
CFAA Amendment Would Make the Life of a Security Researcher Even Tougher
US senators try to pass the same sneaky amendments that didn't pass in CISA, now hidden inside the Email Privacy Act
- Hacking News
- By Catalin Cimpanu
- April 28th, 2016
Dissension Grows Inside Anonymous Because of Political Propaganda
The masked hacktivists are turning on each other as the US presidential election looms closer and closer
- Security
- By Catalin Cimpanu
- April 21st, 2016
Law Enforcement, Government Agencies See Phishing as Main Cyber Risk
Weak identity and authentication systems, vulnerable websites, and DDoS attacks are the other top cyber threats
- Security
- By Catalin Cimpanu
- March 26th, 2016
Node.js Package Manager Vulnerable to Malicious Worm Packages
Nothing is safe these days, not even Node's npm
- Editorials
- By Catalin Cimpanu
- March 12th, 2016
CVE System Sees Huge Backlog, Researchers Propose Alternative
Conspiracy theories arise as MITRE's CVE system fails to assign CVE identifiers for all reported security bugs
- Editorials
- By Catalin Cimpanu
- February 23rd, 2016
What If the San Bernardino Shooter Had Used an Android Instead?
Google's latest Android encryption and security features are as tough as Apple's, would be in the same predicament
- Editorials
- By Catalin Cimpanu
- January 11th, 2016
GM Starts Bug Bounty Program, but Would Security Researchers Trust It?
General Motors aligns with modern tech companies and starts a bug bounty program via the HackerOne platform
- Security
- By Catalin Cimpanu
- December 27th, 2015
The Top 10 Biggest Security Incidents of 2015
A list of the biggest hacks and data breaches from 2015, from the Ashley Madison breach to the Juniper backdoor
- Security
- By Catalin Cimpanu
- December 7th, 2015
Prevent Certificate Blunders with the Certificate Expiry Monitor
Get notified whenever an SSL/TLS certificate expires, and avoid being ridiculed by your sysadmin friends
- Editorials
- By Catalin Cimpanu
- October 21st, 2015
US Government Preparing Bill to Make Car Hacking Research Illegal
Car maker lobbying groups show their might
- Editorials
- By Ionut Ilascu
- May 16th, 2015
Don’t Believe the Hype
VENOM has only one fang, Rombertik is a dud
- Editorials
- By Ionut Ilascu
- April 5th, 2015
Volatile Cedar Cyber Spying Op May Not Be the Work of a Foreign Country
Campaign focused on intelligence gathering since 2012
- Editorials
- By Ionut Ilascu
- March 22nd, 2015
Security Companies and Government Intelligence
Clash between cyber-spying and the defense companies
- Editorials
- By Ionut Ilascu
- March 8th, 2015
A Safe Mobile Device Starts with Its Owner
Sticking to official distributions is a safer alternative
- Editorials
- By Ionut Ilascu
- March 1st, 2015
The Weak Link in the Chain
Third-party components are also a responsibility