Michaels and Staples breaches carried out by same attackers?
The attackers that stole payment card information from consumers of Texas-based arts and crafts store chain Michaels and international office supply chain store Staples are …
One-in-four have been victims of identity theft
Identity theft has ranked as the top concern amongst consumers questioned about their digital lifestyles, according to Centrify. The survey of 1,000 UK consumers, reveals that …
Trojanized Android firmware found on inexpensive handhelds
It’s unfortunate, but true: we live in a world where even if we buy a brand new mobile phone, it’s no guarantee that it’s malware-free. Researchers from …
Top 5 fraud risk areas in the workplace
Limited knowledge and awareness about what constitutes confidential information is putting UK businesses at risk of falling victim to fraud if these materials are not securely …
TRUSTe deceived consumers through its privacy seal program
TRUSTe has agreed to settle Federal Trade Commission charges that it deceived consumers about its recertification program for company’s privacy practices, as well as …
ReadyNAS OS offers 5 levels of data protection
NETGEAR is releasing a new version of its ReadyNAS operating system for its ReadyNAS family of desktop and rack-mount NAS devices. ReadyNAS OS 6.2 offers improvements in data …
Suspected WireLurker creators and distributors arrested in China
Three individuals been arrested by the Beijing Municipal Public Security Bureau in connection to the WireLurker OS X and iOS malware being served to users of Maiyadi, a …
Attackers shellshock, take over devices running on BusyBox
ShellShock, the remote code execution bug (CVE-2014-6271) affecting GNU Bash, the command interpreter present on many Unix systems and Linux distributions, is still being …
US State Department targeted by hackers
Around the same time the unclassified network of the Executive Office of the US President was breached, the same thing happened to some computer systems belonging to the US …
Most of the top 100 paid Android and iOS apps have been hacked
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies. In addition to an increase in app hacks …
Malicious Tor exit node is run by MiniDuke APT actors
The malicious Tor exit node located in Russia that added malicious code to the software downloaded by users has been tied to the APT actors wielding the MiniDuke backdoor. …
How to become an ISO 27001 / ISO 22301 consultant
If you are thinking about a career change, becoming an independent consultant for ISO 27001 and/or ISO 22301 certainly sounds like an attractive option. But what do you need …
Featured news
Resources
Don't miss
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted
- Identifying high-risk APIs across thousands of code repositories