Don't-Miss Security Stories


US agency tells electric utilities to shore up authentication

A new U.S. National Institute of Standards and Technology guide for electric utilities offers ways they can shore up their cybersecurity efforts.

150817 google marshmallow 03

Certifi-gate flaw in Android remote support tool exploited by screen recording app

An application hosted in Google Play until yesterday took advantage for months of a flaw in the TeamViewer remote support tool for Android in order to enable screen recording on older devices.

Vinton Cerf Heidelberg Laureate Forum

'Sometimes I'm terrified' of the Internet of Things, says father of the Internet

Vint Cerf is known as a "father of the Internet," and like any good parent, he worries about his offspring -- most recently, the IoT.

Ashley Madison hack

Ashley Madison hauled to court in class action suits over data breach

Legal pressure on Ashley Madison and its parent company is picking up with more class-action lawsuits filed this week against the extramarital hookup site in the U.S., alleging negligence by the site in protecting confidential user data.

Startup takes heat over online tool that checks Ashley Madison data

A startup accused of crude marketing centered around the Ashley Madison data breach said Monday it is changing its tactics amid criticism.


Court: FTC can bring down the hammer on companies with sloppy cybersecurity

A U.S. appeals court has turned down hotel operator Wyndham Worldwide's challenge of the Federal Trade Commission's authority to enforce cybersecurity practices.

windows hello

Testing suggests that not even identical twins can dupe Windows Hello

If The Australian's testing is any indication, you shouldn't have to worry too much about your evil twin or doppelgänger unlocking your PC using Windows Hello.

Security in cloud computing

Plenty of fish, and exploits too, on dating website

Recent visitors to Plenty of Fish, an online dating website with over 3 million daily active users, had their browsers redirected to exploits that installed malware.

China group attacks India with Word exploit, then uses Microsoft's WMI

A hacking group suspected of operating from China has had success stealing information from mostly Indian targets, often pertaining to border disputes and trade issues, according to FireEye.

avid life media

Latest Ashley Madison data dump reveals emails, source code for websites

The woes of’s owners continued Thursday, with a second large release of internal data that security experts suspect is authentic.


Vulnerability in enterprise-managed iOS devices puts business data at risk

A vulnerability in the iOS sandbox for third party applications, like those installed by companies on their employees' devices, can expose sensitive configuration settings and credentials.

kali linux 2 desktop

Meet Kali Linux 2.0, a distro built to hammer your security

The newest version of Kali Linux is built so you can update its penetration testing tools with less hassle.

Adobe patches important flaw in LiveCycle Data Services

Adobe Systems released a security patch for LiveCycle Data Services, a development tool used by businesses to synchronize data between back-end servers and rich Internet applications built with Adobe Flex or AIR.

Russian cyberspies targeted punk rock band Pussy Riot

A closely watched band of suspected Russian hackers have spied on domestic targets, including two members of the outspoken punk rock band Pussy Riot.

Ashley Madison hack

Hackers release full data dump from Ashley Madison, extramarital dating site's owner said Tuesday it is examining a large batch of data posted online by hackers who breached the website last month.