93% of DDoS attacks last 30 minutes
As the tide of DDoS attacks continues to expand, the rise of the Internet of Things (IoT) and the influx of network connected devices, such as webcams and routers, are leading …
Unpatched, vulnerable PDF readers leave users open to attack
Unpatched, vulnerable PDF readers are a big security issue for private PC users, according to Secunia. 14% of PC users in the US (up from 12.9% last quarter) have an unpatched …
Crypt0L0cker ransomware avoids US computers
“Yet another piece of ransomware has surfaced, and this one has several interesting things about it: it expressly avoids targeting US users, and it has a hardcoded list …
5,000+ e-commerce sites at risk due to buggy WordPress plugin
A popular WordPress e-commerce plugin that is actively used on over 5,000 websites contains high-risk vulnerabilities that can be exploited to compromise customers’ …
Fraudsters steal millions from Ryanair account
Fraudsters have apparently managed to syphon some 4.5 million euros (about $5 million) out of a bank account belonging to Ryanair, Europe’s biggest low-cost …
Tor Browser 4.5. is out, with new security and privacy upgrades
The Tor Project has released version 4.5 of its popular Tor Browser, and this new version comes with a number of security and privacy improvements.Users can now use a Security …
Why you should steer users towards less predictable passwords
As users are instructed to create ever more complex passwords, and developers are starting to use encryption methods more difficult to crack than standard hashing functions, …
Hacker exploits Android devices with self-implanted NFC chip
A security researcher has demonstrated that it’s possible to implant yourself with a NFC chip that will not be detected by body scanners at airports or other …
Threats on government networks remain undetected for 16 days
Government cyber security professionals estimate that cyber threats exist on their networks for an average of 16 days before they are detected – hiding in plain sight.The good …
High volume DDoS attacks still persistent
Arbor Networks released global DDoS attack data that shows a continuation of extremely high volume attacks. In Q1 2015, there were 25 attacks larger than 100Gbps globally.In …
Researchers mount cyber attacks against surgery robot
A group of researchers from University of Washington have tested the security of a teleoperated robotic surgery system created by their colleagues, and have found it severely …
Police dismantle gang of online fraudsters and romance scammers
The Italian Financial Police (Guardia di Finanza), supported by Europol, arrested 10 members of a transnational criminal group. The criminals, mainly Nigerian citizens, were …
Featured news
Resources
Don't miss
- Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads