
World-Check crime and terror database exposed online
Security researcher Chris Vickery, who has become well-known for unearthing databases that should not be accessible via the Internet but are, has found another one that …

Symantec, Norton AV products are riddled with serious flaws
Google security researcher Tavis Ormandy has unearthed a slew of critical vulnerabilities, including many remote code execution flaws, in Symantec and Norton enterprise and …

Most used drives sold on eBay hold personal information
Ecommerce sites are reselling used electronics without permanently erasing data from them. Based on an analysis of 200 second-hand hard disk drives and solid state drives …

The Network Ops DDoS Playbook
With the prevalence of DDoS attacks, good preparation and planning can go a long way toward making the DDoS response process as manageable, painless, and inexpensive as …

Businesses are unprepared for emerging threats
Organizations are failing to appreciate the growing challenges of protecting their data and, as a result, are experiencing the economic impact of data loss, according to EMC. …

US artificial intelligence market set to surge
The artificial intelligence market in the US is projected to grow at a CAGR of 75% until 2021 on account of increasing AI technology adoption, according to TechSci Research. …

Privacy pitfalls of Facebook using your location to suggest friends
If you are a Facebook user and you haven’t guessed by now that it will sometimes suggest “friends” based on the fact that you happened to be at the same …

25,000-strong CCTV botnet used for crippling DDoS attacks
A DDoS attack against a jewelry shop website has lead researchers to the discovery of a CCTV botnet comprised of some 25,000 cameras from around the globe. The website had …
Android-rooting malware lurking on Google Play
For a while now Android-rooting malware has been creeping in Google’s Play store. The latest instance, discovered by Lookout researchers, masquerades as LevelDropper, an …

Cyber threats today: Significant and diverse
Insider data theft and malware attacks top the list of the most significant concerns for enterprise security executives, according to Accenture. Of those surveyed, 69 percent …

Building a new open standard for cloud-based digital signatures
On July 1, 2016, a new European Union signature regulation (eIDAS) will go into effect, helping pave the way for global adoption of secure digital signatures. Aligned with …

UK banking customers targeted with Retefe Trojan with MitM capabilities
UK users are the latest targets of cyber crooks leveraging the Retefe banking Trojan and a rogue root certificate. The malware is out to steal online banking credentials of …
Featured news
Resources
Don't miss
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works