The Federal Centre for Cybersecurity is going to provide companies and institutions a legal framework to accommodate ethical hacking on their infrastructure

Pre-installed software using unsecure updating mechanisms becomes an entry point for hackers

Last month the Bangladesh Central Bank got hit by hackers who managed to get away with 80M$. If it wasn't for a spelling mistake in one of the fake transactions the total amount could have been 1B$... Apart from the amounts not very newsworthy unfortunately.

According to a study done by security company Balabit social engineering is the number one method of accessing confidential data.

We discussed passwords here before, mainly about how people are bad at choosing passwords. This time we come at the subject from a different angle: the passwords hackers use to get into networks.

Researcher Tavish Vaidya from Georgetown University has compiled and analysed major cyberattacks spanning the period of 2001 to 2013. A very interesting, albeit depressing, document.

An IT security drill went off the tracks, prompting the Flemish government office to apologise to European high-speed train operator Thalys for involving it without warning.

Every time a database of usernames and passwords gets hacked and is published I can't help but look at the passwords that are being used the most. And every time I see the same easy-to-guess passwords make their appearance, again and again ("123456" anyone?)