New UK law says GCHQ agents cannot be prosecuted for hacking
In a job posting published last week, the Government Communications Headquarters (GCHQ) – the UK version of US’ National Security Agency – openly announced …
Fake PayPal payment reversal notification leads to phishing
PayPal phishing attempts take many forms, and one of the most often used techniques is fake emails containing a warning and a prompt to act quickly.An active phishing campaign …
Address spoofing Safari bug opens door for phishing attacks
Hacker David Leo has released a PoC exploit for a Safari vulnerability that can be misused to trick users into thinking they are on one site while they are actually on another …
The cybersecurity domino effect
RedSeal unveiled its survey of high-ranking executives that illustrates widespread concern regarding the potential effects of cyberattacks in corporate America.Most of the …
Secure smart devices for the holiday season
Summer is almost here and many are currently considering taking their beloved smart devices with them on their travels. However, the risks of doing so are sizeable.With a …
Trojanized, info-stealing PuTTY version lurking online
“A malicious version of the popular open source Secure Shell (SSH) client PuTTY has been spotted and analyzed by Symantec researchers, and found to have …
How much money do cyber crooks collect via crypto ransomware?
“FireEye researchers have calculated that the cybercriminals wielding TeslaCrypt and AlphaCrypt have managed to extort $76,522 from 163 victims in only two months. …
Penn State engineering network is taken offline following two cyberattacks
The computer network of Pennsylvania State University’s College of Engineering has been temporarily disconnected from the Internet in the wake of two “highly …
European Internet users urged to protect themselves against Facebook tracking
In the wake of the revelations about Facebook’s tracking of users who do not own a Facebook account, the Belgian Privacy Commission has issued a set of recommendations …
Week in review: VENOM bug, infosec and ethics, and flawed crypto endangers smart grid devices
Here’s an overview of some of last week’s most interesting news, podcasts and articles:IoT and the great data heistWith the introduction of new mobile devices in …
ISSA-LA to hold premier Los Angeles information security event
The Seventh Annual Information Security Summit offers educational sessions presented by a world-class line up of keynote and featured presenters.This year’s Summit and …
Rogue GTA 5 mods carry password-stealing malware
“Gamers who choose to play Grand Theft Auto V (GTA 5) on their PC should be carefull not to install two game mods that have been found to be bundled with malware. …
Featured news
Resources
Don't miss
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems
- Meta open-sources AI tool to automatically classify sensitive documents