The 2016 SecurityWeek CISO Forum will take place June 1-2 at the beautiful Ritz-Carlton, Half Moon Bay, just south of San Francisco.
read more
SSL Encryption: Keep Your Head in the Game
Cryptography isn’t new. Humans have always liked to keep secrets. Or at least try.
More than 400 years ago, Mary, Queen of Scots, tried. Unfortunately, in the encryption-gone-wrong Babington plot, she didn’t fair so well. When one of Queen Elizabeth’s cunning advisors decrypted a coded correspondence about an assassination conspiracy, it was off with poor Mary’s head.
read more
Bangladesh Central Bank Governor Quits Over $81 Million Heist
Bangladesh's central bank chief resigned on Tuesday, after hackers stole $81 million from the nation's foreign reserves in one of the biggest bank heists in history, the finance minister said.
read more
Google Offers $100,000 for Chromebook Hack
Google announced on Monday two important changes to its Chrome Reward Program, namely an increased reward for hacking Chromebooks and the addition of a new class of vulnerabilities.
read more
New EDA2-Based Ransomware Easily Neutralized
A new variant of the EDA2 educational ransomware has emerged, only to be quickly neutralized, despite its creator’s confidence that he would never get caught.
read more
New GM Bot Version Released After Source Leak
After the source code of the Android banking Trojan GM Bot was leaked online, the malware’s developer announced the release of a new version that has a much higher price tag.
read more
How Mid-market Enterprises Can Protect Against Ransomware Attacks
read more
Continue readingCode.org Flaw Exposes Volunteer Email Addresses
Code.org, a non-profit organization that helps students learn computer science, informed users over the weekend that a flaw on its website allowed unauthorized parties to access the email addresses of its volunteers.
read more
Samsung Fixes MiTM Flaw in Software Update Utility
Vulnerability in Samsung’s SW Update Tool Exposes Systems to Man-in-the-middle Attacks
Samsung has released an update for its SW Update Tool that resolves a man-in-the-middle (MiTM) vulnerability affecting Windows-based laptops.
read more
Cyberterrorist Attacks Unsophisticated but Effective: Former FBI Agent
Cyberterrorist attacks might not be very sophisticated, but they can be highly effective in spreading fear, according to a former FBI agent who now works in the private sector.
read more


