Week in review
Week in review: Target breach expands, the security realities of the Internet of Things
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: How to make malware warnings more effective? An effective security …
Week in review: Snapchat hack, backdoor in Linksys and Netgear routers, and SD memory card hacking
Here’s an overview of some of last week’s most interesting news, articles and reviews: Researchers demonstrate SD memory card hacking Security researchers Andrew …
Week in review: Cryptolocker copycat, CyanogenMod’s built-in SMS encryption, NSA uses Google cookies to track suspects
Here’s an overview of some of last week’s most interesting news and articles: The DDoS debate: Multi-layered versus single solution There is a DDoS debate in the …
Week in review: Air gap-hopping malware, first PoS botnet, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: (IN)SECURE Magazine issue 40 released (IN)SECURE Magazine is a free digital security …
Week in review: Cyber Monday dangers, Twitter adds Forward Secrecy, and a Linux worm that targets the Internet of Things
Week in review: Here’s an overview of some of last week’s most interesting news, videos and articles: Innovations that will shape network security Responding to an …
Week in review: vBulletin.com hack, new perspective on Stuxnet, and ongoing large-scale MitM attacks
Here’s an overview of some of last week’s most interesting news, reviews and articles: Netflix users in danger of unknowingly picking up malware Users of …
Week in review: The operations of a cyber arms dealer, and top scams of the holiday season
Here’s an overview of some of last week’s most interesting news, articles and interviews: Snowden social-engineered co-workers to share their passwords New IE …
Week in review: TrueCrypt’s public security audit, new MS 0-day exploited, new bug bounty programs
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: ENISA issues recommendations for securing data using cryptography …
Week in review: NSA taps Google and Yahoo, breaking game console security, phone calls more dangerous than malware
Here’s an overview of some of last week’s most interesting news and articles: ISO 27001 standard benefits, implementation tips and security controls Dejan Kosutic …
Week in review: PHP.net compromise, Facebook data mining, and how to social engineer a social network
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: The Basics of Web Hacking: Tools and Techniques to Attack the Web …
Week in review: Vessel tracking system cracked, iCloud protocols analyzed, the relevancy of AV tests
Here’s an overview of some of last week’s most interesting news, videos, inteviews and articles: Digital ship pirates: Researchers crack vessel tracking system In …
Week in review: Dangerous vBulletin exploit in the wild, Blackhole exploit kit creator arrested
Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: How to establish trust in the cloud In order to enforce corporate …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)