Actions to strengthen your defense, minimize damage
IT professionals should use the nearly epic scale of the Sony cyber attacks to spur their companies into action versus panicking about potential risks. “The FBI is right …
Cybercrime will continue to evolve
The breadth and depth of the data breaches seen by the world in 2014 was shocking – spanning major banks, e-commerce giants, healthcare giants, casinos and others, …
Week in review: ICANN systems breached, critical Git and SOHO router flaws
Here’s an overview of some of last week’s most interesting news, reviews and articles: The problem with security shortcuts A combination of irresponsible user …
USBdriveby: Compromising computers with a $20 microcontroller
Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy …
New Zeus variant targets users of 150 banks
A new variant of the infamous Zeus banking and information-stealing Trojan has been created to target the users of over 150 different banks and 20 payment systems in 15 …
Critical flaw on over 12M routers allows device hijacking, network compromise
A critical, easy to exploit vulnerability that opens more than 12 million SOHO routers around the world to remote compromise has been discovered by Check Point researchers. …
Cybercriminals won’t take a vacation this holiday season
The holiday period is a time to celebrate with family and loved ones. Unfortunately, cybercriminals will use the season to take advantage of businesses as IT staff and end …
Critical Git flaw allows attackers to compromise developers’ machines
A critical vulnerability affecting all versions of the official Git client and all related software that interacts with Git repositories has been found and patched, and …
Top 5 social media security predictions for 2015
Mobile ransomware, targeted job fraud and Trojans lurking behind shocking videos are all expected to make their appearance on social media in 2015. Studies in the last year on …
Smart grid security certification in Europe
ENISA issues a report on smart grid security certification in Europe targeted at EU Member States (MS), the Commission, certification bodies and the private sector; with …
Researcher publishes JavaScript DoS tool
Trigger-happy attackers looking for additional ways to bring websites to their knees by means of a DoS attack have been given another tool that can aid in their efforts: …
Malware peddlers take advantage of Sony’s decision to pull controversial film
In the wake of Sony Pictures Entertainment’s decision to scrap the theatrical release of the controversial film “The Interview” altogether, cyber criminals …
Featured news
Resources
Don't miss
- EU launches EU-based, privacy-focused DNS resolution service
- Roundcube RCE: Dark web activity signals imminent attacks (CVE-2025-49113)
- Balancing cybersecurity and client experience for high-net-worth clients
- CISOs, are you ready for cyber threats in biotech?
- fiddleitm: Open-source mitmproxy add-on identifies malicious web traffic