IS hackers are attacking the US energy grid
The US energy grid is under cyber attack from Islamic State hackers but fortunately, these attacks end up in failure because the hackers are simply not skilled enough to do …
8 key online fraud behaviors and patterns
Sift Science examined data from 1.3 million online transactions and profiles in various industries from August 2014 to August 2015. Data was cross-referenced with third-party …
Wargame teaches senior leaders about strategic threats and risks
On Oct. 13 Booz Allen and the FC2 held a cybersecurity wargame simulation for senior officials in the public and private sectors at the University of South Florida, the home …
Malicious Google Chrome clone eFast serves ads, collects info
A Google Chrome lookalike browser dubbed eFast is being actively pushed onto users. The software is at best annoying and unwanted, and at worst can lead users to …
Oracle releases 154 fixes, plugs click-to-play bypass Java flaw used in attacks
Oracle has released its quarterly patch update that contains 154 security fixes for its various products.What will interest end users the most are the fixes released for Java, …
Companies still lack security controls for accessing enterprise applications
Despite widespread and highly publicized security breaches, most companies still fail to require necessary security controls for accessing enterprise applications, including …
Western Digital self-encrypting hard drives are completely insecure
A team of researchers has decided to check whether the encryption offered by Western Digital’s My Passport external self-encrypting hard drives is effective and …
Wargame teaches senior leaders about strategic threats and risks
On Oct. 13 Booz Allen and the FC2 held a cybersecurity wargame simulation for senior officials in the public and private sectors at the University of South Florida, the home …
8 key online fraud behaviors and patterns
Sift Science examined data from 1.3 million online transactions and profiles in various industries from August 2014 to August 2015. Data was cross-referenced with third-party …
Criminals hacked chip-and-PIN system by perfecting researchers’ PoC attack
When in 2010 a team of computer scientists at Cambridge University demonstrated how the chip and PIN system used on many modern payment cards can be bypassed by making the POS …
Private email account of CIA Director compromised by teenage hackers?
CIA Director John Brennan apparently got his private AOL email account hacked, and the attackers revealed that it contained information that shouldn’t have been there: …
250+ iOS apps offered on Apple’s App Store found slurping user data
The latest instance of potentially malicious apps tricking Apple App Store’s vetting process comes courtesy of Youmi, a China-based mobile advertising provider whose …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military