Please turn on your JavaScript for this page to function normally.
HBGary does some reputation building

A little over two months have passed from the HBGary breach, and the unfortunate incident seemed to have somewhat faded from public consciousness, supplanted by the slew of …

Gaping security hole in Skype for Android

The Skype application for Android contains a flaw that allows a rogue app to access and harvest users’ personal information and things like chat logs from the device …

IPv6 for Enterprise Networks

The February news that the last batch of IPv4 addresses has been distributed has resounded across the Internet as a final wake up call. It made everybody aware of the fact …

Epsilon breach leads to more than just phishing

Since the Epsilon breach, the customers of the company’s clients – such as US Bank, JPMorgan Chase, TiVo, Capital One, the Home Shopping Network, LL Bean Visa …

Next Safari version will include do-not-track tool

Safari is the latest of the top four most popular browsers to receive a do-not-track privacy tool. So far, the feature is still being tested by developers, but if everything …

Malware silently hijacks Facebook account and adds apps

Several months ago, when the operators of the Sality P2P botnet pushed out malware that not only collected usernames and passwords and sends them to the C&C servers but …

U.S. authorities hijack botnet by substituting C&C servers

The U.S. Department of Justice and the FBI have been granted by the federal court the permission to substitute the C&C servers of the massive Coreflood botnet with …

WordPress.com servers breached, source code presumed copied

Automattic – the web development corporation behind WordPress.com – has suffered a root break-in and a compromise of several of their servers. “We have been …

Why stealing at a security conference is a bad idea

ISC West is one of the biggest international security conferences, and practically every inch of the expo floor has a camera or two trained on it. You would expect that such a …

Popular web stores vulnerable to “free shopping” exploits

A recently published paper titled “How to Shop for Free Online” presents the depressing results of a security analysis of some of the most popular online stores, …

“Request rejected” spam campaign leads to fake AV

A spam email campaign carrying a malicious attachment designed to download and run a fake AV solution on the recipient’s computer is currently hitting inboxes around the …

French hacker and alleged Anonymous member arrested after bragging on TV

A French hacker has effectually tied a noose around his own neck when he bragged about hacking into the systems of a big government contractor on national TV. He participated …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools