The unstoppable rise of DDoS attacks
For the past three quarters, there has been a doubling in the number of DDoS attacks year over year, according to Akamai. And while attackers favored less powerful but longer …
Keep your site more secure with WordPress 4.3
WordPress 4.3, named Billie in honor of jazz singer Billie Holiday, is available for download or update in your WordPress dashboard.The new version enables you to keep your …
Mozilla is experimenting with improved Private Browsing
Mozilla Foundation is again aiming to boost the privacy of Firefox users, and is beginning to test a new, improved kind of Private Browsing.“All major browsers offer …
Does your mobile carrier track you online?
At least nine mobile carriers around the world are using “supercookies” to track users’ web browsing, a study by human rights organization Access has …
Researcher releases exploit for OS X 0-day that gives root access
Italian security researcher Luca Todesco has published PoC exploit code for a newly discovered zero-day privilege escalation flaw affecting OS X Yosemite (v10.10) and …
How to sabotage DDoS-for-hire services?
We all know the damage that DDoS-for-hire services can inflict on websites and organizations behind them.What is less known is that a simple move like making PayPal seize the …
IBM is betting big on open source in the enterprise
IBM launched LinuxONE, a new portfolio of hardware, software and services solutions, providing two distinct Linux systems for large enterprises and mid-size businesses.The …
Sound-Proof: Two-factor authentication without user interaction
Reaping all the benefits of two-factor authentication without suffering the inconvenience that is usually attached to the option is something that many users dream about …
Five points of failure in recovering from an attack
An over emphasis on defense is leaving the financial sector exposed to cyber attack. An increase in threat levels has seen the sector bolster defenses by focusing on detection …
Privileged accounts are still easy to compromise
A Thycotic survey of 201 Black Hat USA 2015 attendees found that a majority (75%) have not seen a fundamental change in the level of difficulty in compromising privileged …
BitTorrent clients can be made to participate in high-volume DoS attacks
A group of researchers have discovered a new type of DoS attack that can be pulled off by a single attacker exploiting weaknesses in the BitTorrent protocol family.The …
Google plugs Google Admin app sandbox bypass 0-day
After having had some trouble with fixing a sandbox bypass vulnerability in the Google Admin Android app, the Google Security team has finally released on Friday an update …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous