Please turn on your JavaScript for this page to function normally.
Week in review: Reactions to VeriSign hack, Anonymous leaks FBI conference call, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: The F-BOMB: A tiny $50 spying computer for DARPA As …

Week in review: “Frankenmalware”, Kelihos malware author revealed, and the tragic state of SCADA security

Here’s an overview of some of last week’s most interesting news: Tool used in Anonymous Megaupload campaign Looking at the LOIC downloads so far this year, …

Week in review: Zappos, Symantec breaches, identities of Koobface gang revealed, and Megaupload shutdown

Here’s an overview of some of last week’s most interesting news and podcasts: Google Docs hosted phishing schemes abound Sophos has recently spotted two distinct …

Week in review: Currency rounding attacks, Trustworthy Computing Initiative anniversary, and how to foil targeted attacks

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Most unusual laptop recovery stories From the good, the bad, and …

Week in review: Leaked Symantec code, the grayware problem, and securing Android for the enterprise

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Hackers aim to fight Internet censorship with own communication …

Week in review: Stratfor breach, brute-forcing WAPs and an analysis of Facebook attacks

Here’s an overview of some of last week’s most interesting news: What’s in store for us in 2012 Looking forward into what lies ahead for us in 2012, Zscaler …

Week in review: Mobile application security risks, holiday-themed scams, and reasons for ditching Java

Here’s an overview of some of last week’s most interesting news and podcasts: Windows 8 will have picture password sign in As much as security experts would like …

Week in review: Multiple dimensions of corporate espionage, 2012 biggest security threats, and avoiding malware behind QR codes

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Rise of unencrypted cards 71 percent of merchants were found to store …

Week in review: Facebook bug gives access to private photos, zero-day exploited in ongoing attacks, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, articles and interviews: IT pros can’t resist peeking at privileged information IT security …

Week in review: The Carrier IQ issue, how cyber attackers think, and the problem with malware metrics

Here’s an overview of some of last week’s most interesting news and podcasts: Anonymous bloggers in danger of being exposed You’re a blogger who, for …

Week in review: Rogue web browsers, the most vulnerable smartphones, and secure practices for online shopping

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Secure practices for online shopping These simple steps apply to everyone …

Week in review: Apple OS X sandbox hole, hiding messages in VoIP packets and U.S. water utility attack

Here’s an overview of some of last week’s most interesting news, podcasts, interviews and reviews Apple OS X sandbox hole allows bypassing of restrictions …

Don't miss

Cybersecurity news