Do you have what it takes to be an independent security consultant?
It doesn’t matter if you’re part of a big enterprise or a small company, you’ve probably wondered at least once what it would be like to work for yourself. Dreams …
Fake Chrome LastPass extension leads to unwanted installs
A fake LastPass extension has been found lurking on the Chrome Web Store, offering promises of free and easy password management, but instead taking users for a ride involving …
Attackers use open source security tools for targeted cyberespionage
Kaspersky Lab researchers have uncovered a new trend among cyberespionage threat actors: instead of developing customized hacking tools or buying them from third-party …
Most users limit personal info on social media due to hacking fears
Only 10 percent of internet-using adults in America used at least one social networking site in 2005. More than a decade later that number has grown exponentially, with 84 …
Cybersecurity insurance: A global perspective
While the majority of global organizations say that it is “vital” their organization is insured against information security breaches, less than half (41%) are …
Facebook made to serve phishing forms to users
Netcraft researchers have recently spotted an extremely convincing Facebook phishing attack. The fraudsters made it look like the fake “Facebook Page Verification” …
7 million users affected by Minecraft community Lifeboat data breach
Minecraft community fansite “Lifeboat” has admitted that it suffered a data breach in January, after security researcher Troy Hunt added some of the stolen data to …
Info of Qatar National Bank customers, Al Jazeera staff, others, leaked online
A ZIP file containing information supposedly stolen in a hack of the Qatar National Bank has been published on whistleblower site Cryptome on Tuesday. The contents of the …
DDoS aggression and the evolution of IoT risks
Few organizations globally are being spared DDoS attacks, according to a Neustar survey of over 1,000 IT professionals across six continents. With the bombardment fairly …
Cybercriminals increasingly exploiting human nature
Cybercriminals are exploiting human nature as they rely on familiar attack patterns such as phishing, and increase their reliance on ransomware, finds the Verizon 2016 Data …
How the biometrics market is entering the evolving IoT ecosystem
By 2021, the biometrics market will reach $30 billion and shift its revenue focus, moving away from the governmental sector to emphasize opportunities in the consumer and …
Facebook vulnerability allowed access to personal and payment information
Bitdefender has discovered a significant vulnerability within Facebook which allowed access to any user account through simple social login manipulation. The attacker was able …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services