March 14, 2016 Research Finds Libotr Can Be Exploited Remotely 2 min read - Researchers recently discovered that libotr is vulnerable, so secure instant messaging apps such as Pidgin, ChatSecure, Adium and others are at risk.
March 14, 2016 Locky Sends You an Invoice and Makes You Pay 3 min read - The recently discovered Locky ransomware encrypts data using AES encryption and then demands hundreds of dollars. Here's what you need to know.
March 14, 2016 Password Strength May Trump Frequent Changes, FTC Expert Says 2 min read - Lorrie Cranor, the chief technologist of the FTC, urged users to increase password strength rather than rely on frequent changes.
March 14, 2016 Old Java Flaw Boils Over as Security Pros Pierce Patch 2 min read - A Java flaw that originally surfaced in 2013 is back again, and this time, the patch isn't enough to fix the vulnerability and secure users.
March 10, 2016 Leaping Linux: New KeRanger Ransomware Identified as Modified V4 Linux.Encoder 2 min read - The newly discovered KeRanger ransomware can be used in attacks on Mac OS X thanks to its Linux source code, undermining many perceptions about the OS.
March 10, 2016 Java Malware Becomes a Cross-Platform Threat 2 min read - The Java malware dropper can run on most major computer platforms, making this a cross-platform threat that puts all users at risk.
March 8, 2016 Does Bitcoin Need a Higher Block Size or Transaction Fee? 2 min read - Bitcoin must change to allow for its widespread use or risk falling behind due to a lack of space on the blockchain or inflexible transaction fees.
March 7, 2016 New W-2 Phishing Attacks Tax Corporate Patience 2 min read - Cybercriminals are targeting organizations via phishing attacks that attempt to steal W-2 tax forms and personal or financial data.
March 7, 2016 Firefox OS Reinvented for the Internet of Things 2 min read - Mozilla is reinventing its Firefox OS so it can act as a network for the Internet of Things (IoT). Several projects hope to further this aim.
March 7, 2016 Cybersecurity C-Suite Challenge: Jumping the Action Gap 2 min read - Of the many challenges facing cybersecurity teams and initiatives in the business world, one of the biggest is getting the C-suite involved.