security awareness
Google alerts users about new state-sponsored attacks
Remember when in June Google announced its intention to start warning Gmail users that their account might be targeted by state-sponsored attackers? A clear warning above the …
Information-related risks, threats and compliance
Dr. Eric Cole is a security expert with over 20 years of hands-on experience. He is a member of the Commission on Cyber Security for the 44th President and several executive …
How to recognize rogue online pharmacies
As the prices of pharmaceuticals keep rising, so does the popularity of online pharmacies. Crooks noticed the high earning potential of rogue online pharmacies from the very …
Microsoft’s study into unsecure supply chains leads to botnet disruption
Microsoft’s Digital Crimes Unit has disrupted the functioning of yet another botnet by effecting a takedown of a domain which was also hosting over 500 different strains …
Chip and PIN payment card system vulnerable to “pre-play” attacks
The chip and PIN system employed by most European and Asian banks is definitely more secure than the magnetic strip one, but it doesn’t mean that it doesn’t have …
Apple, Amazon change their security policies following epic hack
In the aftermath of the spectacular hack that left former Gizmodo employee Mat Honan without access to his Twitter account, his Gmail, his iCloud account and with his iPhone, …
Gizmodo hack reveals worrying flaws in data management policies
Mat Honan, the former Gizmodo employee who’s personal Twitter account compromise resulted in the temporary hijacking of the tech blog’s Twitter account, has …
80% of “Olympic” domains are scammy
Popular global events such as the Olympic Games are a boon to cyber crooks, as they know for sure that a huge amount of people will be turning to the Internet to search for …
Researcher releases tool for cracking MS-CHAPv2, PPTP no longer secure
Moxie Marlinspike, the mind behind the Convergence SSL authenticity system, has presented at Defcon a tool that allows attackers to crack the MS-CHAPv2 authentication …
Blackhole exploit kit got upgraded
Phoenix and Blackhole are the most popular and widely used exploit kits because their creators are always tinkering with them and pushing out update and improved attack …
User education essential against social engineering attacks
The five-year analysis of data from Google’s Safe Browsing service shows that the threat landscape of today has evolved considerably from that of just five years ago, …
MySQL flaw allows attackers to easily connect to server
A simple but serious MySQL and MariaDB authentication bypass flaw has been revealed by MariaDB security coordinator Sergei Golubchik, and exploits targeting it have already …
Featured news
Resources
Don't miss
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers