Please turn on your JavaScript for this page to function normally.
Operation Payback: Anonymous group causes service interruptions

The DDoS attacks organized by the Anonymous cyber-activist group against SGAE (Spanish copyright collection society), the Spanish Culture Ministry and Promusicae, which began …

A Guide to Kernel Exploitation

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers …

The importance of e-mail security

E-mail is exposed at various points along its transmission, via backups, by IT staff members, or during firewall inspection. And not just the text: attachments account for …

Facebook privacy changes – a missed opportunity?

Facebook announced yesterday that changes are coming soon to the Facebook interface, in particular to the ‘Groups’ system. According to CEO Mark Zuckerberg, …

The threat behind fake LinkedIn messages

Retarus sent out a warning in response to a current wave of fake contact requests via the social media platform LinkedIn. These well-simulated e-mail messages present a …

Guide helps enterprises design and implement key controls

Recent international regulations have placed the need for monitoring internal controls at the top of the boardroom agenda. Having controls in place is a basic business …

High expectations for personal information protection

According to a recent survey by ING, nine in 10 adults agree that financial services companies should be doing more to protect their customers’ personal and financial …

Navigation and fingerprint authentication device

AuthenTec unveiled today the world’s smallest fingerprint sensor for combining authentication and navigation functions in one device, the AES850. This low profile sensor …

Politically motivated cyber attacks

According to a new report, 53 percent of critical infrastructure providers report that their networks have experienced what they perceived as politically motivated cyber …

Security updates for Adobe Reader and Acrobat

Critical vulnerabilities have been identified in Adobe Reader 9.3.4 (and earlier versions) for Windows, Macintosh and UNIX, Adobe Acrobat 9.3.4 (and earlier versions) for …

The rise of crimeware

Nearly two billion people today use the Internet and in doing so, expose themselves to an extensive and growing number of malware threats. CA researchers identified more than …

The persistence of Trojan attacks and scareware

GFI announced the top 10 most prevalent malware threats for the month of September 2010. Statistics show a staggeringly consistent attack primarily by the same Trojan horse …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools