Malware takes screenshots of the infected players virtual poker hand
“Malicious spyware is targeting users of Full Tilt Poker and PokerStars online games, ESET researchers have revealed. The spyware, named Odlanor, takes screenshots of …
Microsoft details how Device Guard fights malware in Windows 10
As Windows 10 was being prepared for release, Microsoft presented many new security features (and we’ve written about some) to be included in the new version of the …
Persistent XSS flaw in SharePoint 2013 revealed, patched
Among the vulnerabilities patched earlier this month by Microsoft is an important one that endangers users of Microsoft SharePoint 2013, a web application platform in the …
(IN)SECURE Magazine issue 47 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 47 has been released today.Table of contents: …
Android 5 bug allows attackers to easily unlock password-protected devices
If you own a mobile device running any Android 5 version but the very last (v5.1.1) and you use a password to lock your device, you will want to update your OS or switch to a …
Container security concerns escalate
86% of IT decision makers say their companies already deploy containers, or they plan to do so within a year, according to Twistlock. Of these, 35% said containers are already …
Why background screening is vital for IT security
Which security controls are the most important in thwarting cyber crime against businesses? Anti-malware? Physical security? According to a recent survey, people are a main …
230,000 new malware samples detected each day
“PandaLabs has confirmed a record increase in the creation of new malware samples. In the second quarter of 2015 alone there were an average of 230,000 new malware …
Privacy International helps individuals find out if they were spied on by the GCHQ
Continuing with its “Did GCHQ Illegally Spy On You?” campaign, Privacy International has set up a website with instructions for individuals and organizations on how to …
The rise of repeated “low and slow” DDoS attacks
There’s been a significant change in the nature of DDoS attacks that is leaving businesses exposed to data breaches and malware.Recent research from Neustar shines a …
Do we need harsher penalties and enforced data breach detection measures?
The spate of high-profile data breaches reported in recent years is leading to increasing public fear about organizations’ ability to prevent and detect cybercrime, according …
Industrial security awareness continues to remain low
While traditional manufacturing industries were not designed with security in mind, the proliferation of networks and devices, disparate communication channels, and the use of …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous