XMPP, Tor, and Other Initiatives to Secure the Internet of Things

XMPP, Tor, and Other Initiatives to Secure the Internet of Things

Legislators, security companies turn their sights on IoT

New Open Source Linux Ransomware Shows Infosec Community Divide

New Open Source Linux Ransomware Shows Infosec Community Divide

Security researchers can't decide if publishing open-source ransomware on GitHub is a bad or a good idea

CFAA Amendment Would Make the Life of a Security Researcher Even Tougher

CFAA Amendment Would Make the Life of a Security Researcher Even Tougher

US senators try to pass the same sneaky amendments that didn't pass in CISA, now hidden inside the Email Privacy Act

Dissension Grows Inside Anonymous Because of Political Propaganda

Dissension Grows Inside Anonymous Because of Political Propaganda

The masked hacktivists are turning on each other as the US presidential election looms closer and closer

Law Enforcement, Government Agencies See Phishing as Main Cyber Risk

Law Enforcement, Government Agencies See Phishing as Main Cyber Risk

Weak identity and authentication systems, vulnerable websites, and DDoS attacks are the other top cyber threats

Node.js Package Manager Vulnerable to Malicious Worm Packages

Node.js Package Manager Vulnerable to Malicious Worm Packages

Nothing is safe these days, not even Node's npm

CVE System Sees Huge Backlog, Researchers Propose Alternative

CVE System Sees Huge Backlog, Researchers Propose Alternative

Conspiracy theories arise as MITRE's CVE system fails to assign CVE identifiers for all reported security bugs

What If the San Bernardino Shooter Had Used an Android Instead?

What If the San Bernardino Shooter Had Used an Android Instead?

Google's latest Android encryption and security features are as tough as Apple's, would be in the same predicament

GM Starts Bug Bounty Program, but Would Security Researchers Trust It?

GM Starts Bug Bounty Program, but Would Security Researchers Trust It?

General Motors aligns with modern tech companies and starts a bug bounty program via the HackerOne platform

  • Security
  • By Catalin Cimpanu
  • December 27th, 2015
The Top 10 Biggest Security Incidents of 2015

The Top 10 Biggest Security Incidents of 2015

A list of the biggest hacks and data breaches from 2015, from the Ashley Madison breach to the Juniper backdoor

  • Security
  • By Catalin Cimpanu
  • December 7th, 2015
Prevent Certificate Blunders with the Certificate Expiry Monitor

Prevent Certificate Blunders with the Certificate Expiry Monitor

Get notified whenever an SSL/TLS certificate expires, and avoid being ridiculed by your sysadmin friends

US Government Preparing Bill to Make Car Hacking Research Illegal

US Government Preparing Bill to Make Car Hacking Research Illegal

Car maker lobbying groups show their might

Don’t Believe the Hype

Don’t Believe the Hype

VENOM has only one fang, Rombertik is a dud

Volatile Cedar Cyber Spying Op May Not Be the Work of a Foreign Country

Volatile Cedar Cyber Spying Op May Not Be the Work of a Foreign Country

Campaign focused on intelligence gathering since 2012

Security Companies and Government Intelligence

Security Companies and Government Intelligence

Clash between cyber-spying and the defense companies

A Safe Mobile Device Starts with Its Owner

A Safe Mobile Device Starts with Its Owner

Sticking to official distributions is a safer alternative

The Weak Link in the Chain

The Weak Link in the Chain

Third-party components are also a responsibility

 
Want more? Browse: