POODLE vulnerability: The end of life of SSL 3.0
There is a critical security vulnerability in SSL 3.0 which allows attackers to calculate the plaintext of encrypted connections, and it will likely spell the end of the use …
Infographic: How to spot a phish
Since many cyber attacks originate with a phishing email, the best way for organizations and individuals to protect themselves online is to identify and avoid phishing emails. …
New Linksys switch compliments WRT router
Linksys announced the Linksys WRT 8-Port Gigabit Ethernet Switch (SE4008), the first in a lineup of new networking peripherals made to complement the Linksys Wireless-AC Dual …
Microsoft patches SandWorm 0-day
Microsoft is back in fine form this month with eight upcoming advisories affecting Internet Explorer, the entire Microsoft range of supported operating systems, plus Office, …
Malicious YouTube ads lead to exploits, ransomware
In the last few months, Trend Micro researchers have been following a malvertising campaign that ended up affecting almost exclusively US users at the beat of more than …
Russian espionage group used Windows 0-day to target NATO, EU
In today’s Patch Tuesday, Microsoft will be releasing a wide variety of patches, and among them will be one for a zero-day vulnerability that has been used in a …
Personal info of 850k Oregon jobseekers potentially compromised
851,322 individuals who used Oregon Employment Department’s WorkSource Oregon Management Information System (WOMIS) will soon be receiving notices that they information …
Spammers spreading new Wolf of Wall Street scam
Millions of penny stock spam emails have been flooding inboxes, spreading a new “Wolf of Wall Street’ scam and inflating the stock values of a mineral deposit …
Dropbox wasn’t hacked, says leaked credentials are from unrelated services
Dropbox has denied that they have been hacked, and that the login credentials leaked by a unknown individual on Pastebin are those of Dropbox users. The leaker released the …
Poor password habits plague our digital lifestyle
Poor password habits are putting employers at risk and losing them hundreds of thousands of pounds in lost productivity, according to new research from Centrify. According to …
Infographic: 4 authentication definitions you should know
This infographic by Wave Systems addresses current authentication problems and illustrates how to ensure that only known users access corporate resources, devices and …
Leaked Snapchat images came from third-party server
Snapchat is a mobile photo messaging app that allows users to send pictures that “self-destruct” a few moments after being viewed, and is especially popular with …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted