Week in review
Week in review: Reactions to VeriSign hack, Anonymous leaks FBI conference call, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: The F-BOMB: A tiny $50 spying computer for DARPA As …
Week in review: “Frankenmalware”, Kelihos malware author revealed, and the tragic state of SCADA security
Here’s an overview of some of last week’s most interesting news: Tool used in Anonymous Megaupload campaign Looking at the LOIC downloads so far this year, …
Week in review: Zappos, Symantec breaches, identities of Koobface gang revealed, and Megaupload shutdown
Here’s an overview of some of last week’s most interesting news and podcasts: Google Docs hosted phishing schemes abound Sophos has recently spotted two distinct …
Week in review: Currency rounding attacks, Trustworthy Computing Initiative anniversary, and how to foil targeted attacks
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Most unusual laptop recovery stories From the good, the bad, and …
Week in review: Leaked Symantec code, the grayware problem, and securing Android for the enterprise
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Hackers aim to fight Internet censorship with own communication …
Week in review: Stratfor breach, brute-forcing WAPs and an analysis of Facebook attacks
Here’s an overview of some of last week’s most interesting news: What’s in store for us in 2012 Looking forward into what lies ahead for us in 2012, Zscaler …
Week in review: Mobile application security risks, holiday-themed scams, and reasons for ditching Java
Here’s an overview of some of last week’s most interesting news and podcasts: Windows 8 will have picture password sign in As much as security experts would like …
Week in review: Multiple dimensions of corporate espionage, 2012 biggest security threats, and avoiding malware behind QR codes
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Rise of unencrypted cards 71 percent of merchants were found to store …
Week in review: Facebook bug gives access to private photos, zero-day exploited in ongoing attacks, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and interviews: IT pros can’t resist peeking at privileged information IT security …
Week in review: The Carrier IQ issue, how cyber attackers think, and the problem with malware metrics
Here’s an overview of some of last week’s most interesting news and podcasts: Anonymous bloggers in danger of being exposed You’re a blogger who, for …
Week in review: Rogue web browsers, the most vulnerable smartphones, and secure practices for online shopping
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Secure practices for online shopping These simple steps apply to everyone …
Week in review: Apple OS X sandbox hole, hiding messages in VoIP packets and U.S. water utility attack
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and reviews Apple OS X sandbox hole allows bypassing of restrictions …
Featured news
Sponsored
Don't miss
- GenAI can enhance security awareness training
- The relationship between cybersecurity and work tech innovation
- eBook: Cloud security skills
- Russian hackers’ custom tool exploits old Windows Print Spooler flaw (CVE-2022-38028)
- CrushFTP zero-day exploited by attackers, upgrade immediately! (CVE-2024-4040)