Endpoint security becoming critical focus area
Detecting and responding to modern threats on endpoints has become a key business priority according to a survey by the Enterprise Strategy Group. They polled 340 IT and …
GnuPG 2.0.27 released
GnuPG is a complete and free implementation of the OpenPGP standard. It allows to encrypt and sign your data and communication, features a versatile key management system as …
Windows 10 will offer password-free authentication
The upcoming Windows 10 will offer more authentication options instead of just passwords, Dustin Ingalls, Group Program Manager for Windows Security & Identity, has …
UK banks’ customers can access accounts with their fingerprint
iPhone users who are also customers of UK banks RBS and NatWest can now access their online banking app by simply pressing their finger on their phone’s home button. The …
Certifying ICS/SCADA professionals
An online survey and interviews with experts from EU Member States and worldwide, analyses how current initiatives on the certification of professional skills are related to …
Credit card info stolen in BigFish Games site compromise
Seattle-based casual gaming company Big Fish Games has has its site and personal and financial information of some of its users compromised in an attack that started on last …
Beware of fake Facebook “Copyright Violations” warnings
The latest Facebook-themed phishing messages doing rounds are trying to trick users into believing they are “making copyright violations” on their Facebook page. …
Arabic cyber espionage group attacking high profile victims
Kaspersky Lab discovered Desert Falcons, a cyber-espionage group targeting high profile organizations and individuals from Middle Eastern countries. The list of targeted …
Pwn2Own 2015: New rules, prizes, and potential problems
If you intend to participate in the Pwn2Own competition at the CanSecWest 2015 conference on March 18 and 19 in Vancouver, Canada, you would do well to consult with a legal …
Vawtrack malware peddlers turn to malicious macros
Cybercriminals spreading new versions of the Vawtrak banking Trojan are the latest ones to use the once again popular macro-based attack. Popular in the early 2000s, this type …
Beware of fake Windows 10 “activators”
The considerable interest users have shown for testing Microsoft’s Windows 10 Technical Preview version has not passed unnoticed by cyber scammers and malware peddlers. …
Flaw in Netgear Wi-Fi routers exposes admin password, WLAN details
A number of Netgear home wireless routers sport a vulnerability that can be misused by unauthenticated attackers to obtain the administrator password, device serial number, …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform