Top 10 cloud myths
Cloud computing is uniquely susceptible to the perils of myths due to the nature, confusion and hype surrounding it, according to Gartner, Inc. These myths slow things down, …
Cyber security coalition reports on Chinese state-sponsored espionage
Novetta Solutions released multiple reports, the main one being titled “Operation SMN: Axiom Threat Actor Group Report”, which details the characteristics of a …
IBM’s Big Data analytics solution to uncover criminal cyber activity in seconds
IBM announced new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate …
APWG launches global cybercrime reporting program
The Anti-Phishing Working Group (APWG) announced the establishment of an open-access cybercrime reporting program to speed the collection and redistribution of cybercrime …
Code Red: A global initiative for fighting government surveillance
Well known and widely respected privacy expert and advocate Simon Davies has announced the creation of a new global initiative that’s aimed at supporting the world-wide …
RBS WorldPay hack ringleader finally sentenced
Nearly five years after the day he was indicted, Sergei Nicolaevich Tsurikov has finally been sentenced for conspiracy to commit wire fraud and computer intrusion for his …
Tor exit node found patching downloaded binaries with malware
A researcher has spotted a Tor exit node located in Russia which instead of delivering the software requested by users untouched, was adding malicious code to the binaries in …
Most IT sec pros still rely on perimeter security to stop APTs
78 percent of IT security professionals are confident that firewalls and antimalware tools are robust enough to combat today’s advanced persistent threats, say the …
Mobile carriers fined $10M for making private user info accessible via Google search
The FCC intends to fine TerraCom, Inc. and YourTel America, Inc. $10 million for several violations of laws protecting the privacy of phone customers’ personal …
57% increase in Backoff malware from August to September
Damballa released a new report highlighting the extent to which malware infections, such as Backoff malware, are able to bypass network prevention controls. The report reveals …
Week in review: Widespread malvertising, iCloud users under attack, and protecting yourself from electronic spying
Here’s an overview of some of last week’s most interesting news and articles: The Software Assurance Marketplace: A response to a challenging problem The growing …
How Facebook prevents account hijacking when old email addresses are recycled
Remember when last summer Yahoo announced they will recycle inactive accounts and offer them to other users? The scheme was more or less successful. Some measures that Yahoo …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted