Protecting personal data in the consumer product industry
Eight in 10 consumers (80 percent) say they are more likely to buy from consumer products (CP) companies that they believe protect their personal information, yet only 37 …
Over 930M Android users in danger as Google stops delivering critical patches
Nearly a billion of Android users – over half of the total number of worldwide users – are in danger of being targeted by cyber attackers exploiting …
Rex Mundi hackers try, fail to blackmail Swiss bank
The Banque Cantonale de Geneve has refused to pay the ransom demanded by a group of hackers that goes under the name of Rex Mundi, and they have made good on their word and …
WhiteHat Aviator browser is not secure, says Google developer
Late last week WhiteHat Security open sourced Aviator, its Chromium-based browser that has been marketed as “the most secure browser online.” The browser offers …
Corel DLL hijacking vulnerability could allow arbitrary command execution
Corel has developed a wide range of products including graphics, photo, video and office software. When a file associated with the Corel software is opened, the directory of …
Ransomware-wielding crooks made over $217,000 in a single month
Crypto-ransomware continues to be a very effective way for cyber crooks to “earn” serious money: the method is so lucrative that with a single campaign, the crooks …
Do we need regular IT security fire drills?
IT security “fire drills’, supported by executive management and the risk committee should be conducted regularly in organizations, in order to understand the …
LizardSquad’s DDoS service is powered by hacked home routers
When the Sony Playstation and Microsoft Xbox Live gaming networks went down over Christmas and were kept offline for several days afterwards, the hacker collective that calls …
Microsoft scolds Google for lack of flexibility in vulnerability disclosure
Microsoft is not pleased with Google’s recent release of the details of a zero-day Windows 8.1 vulnerability and the code that can be used to exploit it, and has …
Is IT security stifling innovation and collaboration?
Critical company data is at risk in the UK as a result of organizations focusing their IT security policies and resources more on external threats, such as cybercriminals and …
Week in review: Bitstamp hack, dangerous code in free apps, insider threats
Week in review: Bitstamp hack, and global defense-in-depth architectures analyzed Here’s an overview of some of last week’s most interesting news, reviews and …
Cyber intrusion lead to physical damage at German steel plant
Three weeks ago, Germany’s Federal Office for Information Security (BSI) released its traditional end-of-the-year report about the state of IT security in Germany. It …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous