PostgreSQL 9.5: Row level security, Big Data and UPSERT
PostgreSQL 9.5 adds UPSERT capability, Row Level Security, and multiple Big Data features, which will broaden the user base for the world’s most advanced database. …
Fitbit, warranty fraud, and hijacked accounts
Online account hijackings usually end up with the account owners being the main victims, but there are fraudsters out there who are more interested in ripping off companies …
Well-informed tech support scammers target Dell users
Has Dell been breached and its databases containing customer’s personal, computer and tech support data been pilfered? Dell still won’t say yes or no, but many …
Bugs in Drupal’s update process could lead to backdoored updates, site compromise
Drupal’s update process is deeply flawed, says IOActive researcher Fernando Arnaboldi. He recently discovered three separate flaws in it, the worst of which could be …
You can’t stop what you can’t see: Mitigating third-party vendor risk
Third-party vendors are a liability for host organizations, often unwittingly creating backdoors and exposing sensitive data. In fact, according to the Ponemon Institute …
HTTPS Bicycle attack reveals password length, allows easier brute-forcing
Dutch security researcher Guido Vranken has come up with a new attack that could allow attackers to discover the length of a user’s password – and therefore make …
Kingston releases encrypted USB with keypad access
Kingston released the DataTraveler 2000 encrypted USB 3.0 Flash drive, which offers hardware encryption and PIN protection with access through an onboard alphanumeric keypad. …
Five major Big Data predictions for 2016
How data is stored, analyzed and processed is transforming businesses. According to MapR Technologies’ CEO John Schroeder, the industry is in the midst of the biggest change …
Consumers expect businesses to be more transparent on how their data is used
A global study of consumers reveals 48% are suspicious about how companies use their data. Based on a poll of more than 18,000 consumers across nine countries, the research …
EFF: T-Mobile breaks net neutrality rules with Binge On service
In February 2015, the FCC has approved net neutrality rules “to preserve the Internet as a platform for innovation, free, expression and economic growth.” In …
Linode forces password reset for all users due to suspected breach
New Jersey-based virtual private server provider Linode can’t seem to catch a break. After being repeatedly hit with DDoS attacks from December 24 to early January, the …
Cyber security guidelines for the shipping industry
A group consisting of several leading shipping organizations and companies has published a set of guidelines to help the global shipping industry develop good solutions for …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services