Please turn on your JavaScript for this page to function normally.
FBI affiliate organization hacked, user database leaked

Only a day after they leaked the details of over one million user accounts and various databases of Sony Pictures and some of its regional sites, LulzSec announced a …

Business continuity: You need more than just a plan

Stop for a moment and take a look around you – IT isn’t just the computer on your desk, the lap top in your bag or the mobile in your pocket. The truth is …

More US military contractors hit by cyber attacks

It seems that the floodgates have opened. Following the confirmed attack against Lockheed Martin‘s computer networks comes the news that two more US military contractors …

Data center IT departments fear targeted attacks

IT departments are now turning to virtualization, with half of the respondents having either implemented or are planning to deploy private clouds, according to a McAfee study. …

Spammers establish their own fake URL-shortening services

For the first time ever, spammers are establishing their own their own fake URL-shortening services to perform URL redirection, according to Symantec. This new spamming …

40% of IT staff could wreak havoc to your network

A survey showed that 40% of IT staff admit that they could hold their employers hostage – even after they’ve left for other employment – by making it …

The progress of IT threats in 2010

Cyber criminals have capitalized on the recent growth in popularity of the Android mobile platform. Based on the number of new mobile malware signatures detected during this …

Stolen credit card numbers advertised via Twitter

You would expect online criminals to want to keep a low profile and restrict their attempts of selling stolen wares to shady online criminal forums, but every once in a while …

HADOPI stops monitoring for copyright infringement due to breach

Trident Media Guard – the company tasked by the French High Authority for the Dissemination of Works and Protection of Rights on the Internet to monitor P2P networks and …

Breaches drive enterprises to prioritize access governance

Aveksa announced the findings of a recent survey conducted to examine how companies are re-evaluating their IT security measures following the recent security breaches at …

PSN attackers allegedly used Amazon cloud for attack

Attackers (mis)used the Amazon cloud to mount their attack against Sony’s online services and systems, and they did it legally, says Bloomberg. According to an unnamed …

Cyber criminals moving operations to Canada

Cyber criminals are on the move again and, this time, Canada is the prime target. IP addresses in China and Eastern Europe are highly scrutinized and undergoing intense …

Don't miss

Cybersecurity news