What’s critical to the success of the Internet of Things?
Managing identities and access is critical to the success of the Internet of Things (IoT), but in its current form identity and access management (IAM) cannot provide the …
Hackers and makers to meet in Amsterdam at HITB Haxpo
This year’s Hack In The Box Security Conference in Amsterdam will once again feature the HITB Haxpo. This technology expo for hackers, makers, builders and breakers, …
Equation Group: Cyber espionage, compromising HDD firmware, sophisticated malware
For several years, the Kaspersky Lab Global Research and Analysis Team (GReAT) has been monitoring more than 60 advanced threat actors responsible for cyber-attacks worldwide. …
Is there an overarching organization that helps Arab hackers?
Trend Micro researchers have unearthed two separate but closely linked malware campaigns attributed to Arab parties. The first one, dubbed Operation Arid Viper, is aimed …
Carbanak cyber gang stole hundreds of millions from banks
Since late 2013, an international cyber criminal group has been targeting banks around the world and has made off with $300 million – possibly even more – by …
Banking Trojan Dyreza sends 30,000 malicious emails in one day
A massive spam wave is installing banking Trojan Dyreza on tens of thousands of computers to steal sensitive financial data from unsuspecting customers, warns Bitdefender. …
Google relaxes its rigid 90-day bug disclosure period
Google has announced that its 90-day vulnerability disclosure period will, from now on, be little longer if the situation warrants it. Earlier this year the company was …
1 billion data records compromised in data breaches
More than 1,500 data breaches led to one billion data records compromised worldwide during 2014, according to Gemalto’s Breach Level Index (BLI). These numbers represent …
Week in review: Car hacking and hijacking, critical Windows flaws, and Forbes.com compromise
Here’s an overview of some of last week’s most interesting news, interviews and articles: Which kind of security professional are you? Since I became a part of the …
Scammers pushing fake AdwCleaner in active scareware campaign
An active scareware campaign pushing a fake version of the popular freeware spyware removal tool AdwCleaner is targeting Windows users and is trying to get them to fork over …
How to enable two-step verification for iMessages and FaceTime
After having added a two-step verification feature to allow users to secure their iCloud (Apple ID) accounts, and extending the protection to iCloud backups last September, …
16 million mobile devices infected by malware
Security threats to mobile and residential devices and attacks on communications networks rose in 2014, threatening personal and corporate privacy and information. …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform