For a limited time, the Penetration Testing - A Survival Guide eBook by Packt is available for free. This eBook will provide an introduction in penetration testing and teach you how to check for flaws in vulnerabilities in your network and applications.
EU companies must notify employees in advance if they plan to monitor work accounts, the European Court of Human Rights ruled this week.
An attacker can downgrade components of the Android TrustZone technology to older versions that feature known vulnerabilities and use older exploits against smartphones running an up-to-date operating system.
Jon von Tetzchner, the founder of both Opera and Vivaldi, believes that Google has gotten too big and "is now in a position where regulation is needed."
Chinese authorities have sentenced a young man to nine months in prison for setting up a website for selling VPN software to Chinese users.
YouTube-MP3.org — the largest YouTube ripping service on the Internet — has agreed to shut down permanently as part of a settlement it reached with the Recording Industry Association of America (RIAA) in a lawsuit the organization filed last year.
A bug discovered in an obscure PDF parsing library back in 2011 is also present in most of today's top PDF viewers, according to German software developer Hanno Böck.
Ransom attacks on MongoDB databases rekindled last week and over the weekend with the emergence of three new groups that hijacked over 26,000 servers, with one group hijacking 22,000.
Canadian police have seized the domain of Fazny.ca, an online electronics store that stole users' payment card data and used it to make fraudulent purchases.
The TrickBot banking trojan has added support for stealing funds stored in Coinbase.com accounts, according to a recent version spotted in a distribution campaign last week.
Android bootloader components from five major chipset vendors are affected by vulnerabilities that break the CoT (Chain of Trust) during the boot-up sequence, opening devices to attacks.
Francis Rawls, a former Philadelphia cop, will remain in jail for refusing to decrypt a hard drive federal investigators found in his home two years ago during a child abuse investigation.
This week has seen a big push by Locky using numerous distribution campaigns to try and claim a spot with the big boys. Other than the normal releases of small ransomware creations, we also saw the RIG exploit kit pushing the Princess Ransomware.
A new variant of the CryptoMix ransomware has been released that appends the .empty extension to encrypted files. This article will provide information on what has changed and how to protect your computer from this ransomware.
On October 17, Microsoft will launch the next major version of Windows 10, nicknamed the Fall Creators Update (CFU).
Summer vacation is over! During the past week, security researchers have discovered several distribution campaigns pushing the Locky ransomware via different methods, including a new variant that features one hell of a clever trick.
Today's deal is for a course with over 60 hours of training in information security, risk assessment, digital forensics, and more. This course is normally priced at $1,499, but has been discounted 96% to $59 as part of this deal. This bundle comes with a 15 day satisfaction guarantee or get a refund in store credit.
According to a new law voted in 2016 and which came into effect starting June 1, 2017, foreign companies activating in China could be forced to provide access to their source code to a state agency that has been recently linked to China's nation-state cyber-espionage campaigns.