Russian hackers tap Windows flaw to hit NATO, Ukraine
Russian hackers have exploited a bug in Microsoft’s Windows operating system in order to target computers used by NATO, the European Union, Ukraine and …
Want to Beat Social Engineering? Training Is Key
Of all the misunderstandings out there about hacking and network security, one of the biggest may be that network intrusion and data theft are …
‘Bash bug could be worse than Heartbleed’: ‘Catastrophic’ flaw may threaten the security of millions of internet-connected devices
Warnings have been issued about a ‘catastrophic’ security flaw affecting one of the most important interfaces powering the web. Known as the ‘Bash’ bug, …
CipherShed: A replacement for TrueCrypt
Ever since TrueCrypt developers terminated the development of the popular encryption utility and announced that it was not safe to use, users who need …
Lynis v1.6.0 Released For Download – Linux Security Auditing Tool
Lynis is an open source linux security auditing tool. The primary goal is to help users with auditing and hardening of Unix and Linux …
Kroll Ontrack Develops Way to Recover Data Stuck in Bricked iDevices
Consumers who use Apple’s newest mobile devices, including iPhones and iPads, can recover data such as lost photos and videos that go missing during …
Hackers deliver Kelihos to users sympathetic to Russian ’cause’
Playing off of the conflict in Ukraine, Russian hackers are installing malware on victims’ machines via links found in spam messages purporting to support …
Is Tor’s Anonymous Internet Still Secure?
Browsing the Web with The Onion Router, or Tor, is supposed to make you anonymous. Many of the encryption algorithms used by this popular …
The biggest iPhone security risk could be connecting one to a computer
Apple has done well to insulate its iOS mobile operating system from many security issues, but a forthcoming demonstration shows it’s far from perfect. …
Recent Comments