Are your third-party vendors leaving the door open to hackers?
By now, every security professional in the world should know the story about Fazio Mechanical Services. The Pennsylvania-based company specializes in heating, air conditioning …
Demand for PaaS on the rise
A new age of Develop Your Own Application (DYOA) to meet ever-changing business requirements is driving demand for rapid application development Platform-as-a-Service (PaaS) …
Court decides bank is not to blame for $440k cybertheft
In many ways, small businesses are the perfect target for money hungry cyber crooks. Smaller companies are unlikely to have dedicated IT employees, making it less likely they …
Code hosting Code Spaces destroyed by extortion hack attack
Cloud code hosting service Code Spaces is forced to shut down, as a DDoS attack coupled with an unsuccessful extortion attempt was followed by the attacker deleting most of …
Bitcoin miner lurking on Facebook
Facebook users, beware: a new viral campaign aimed at saddling you with a Bitcoin mining Trojan has been spotted. “The virus spreads through private Facebook messages, …
The future of cloud computing
North Bridge Venture Partners, in conjunction with Gigaom Research and 72 collaborating organizations, today released results for its Future of Cloud Computing survey. This …
Scan of Google Play apps reveals thousands of secret keys
A team of researchers from Columbia University has downloaded and decompiled over 880,000 applications found on Google Play, and has discovered – among other things …
Most European businesses face a tech deficit
A tech deficit currently affects 72% of European businesses and leads to a gap between what businesses need to achieve and what their infrastructure can support. When compared …
Sir Tim Berners-Lee to open IP EXPO Europe
In his first address to the core IT community of IP EXPO Europe, Sir Tim will outline his 2050 vision for the web and how businesses will use it for competitive advantage. …
Would you run potentially malicious programs in return for a dollar?
A group of researchers have discovered a depressing fact: some computer users will download and run an executable that they can’t be sure isn’t malicious for as …
Password protected Zbot malware in the wild
Early this morning a small malware campaign started up claiming to be daily customer statements from Berkeley Futures Limited (real company, but messages are spoofed). The …
Microsoft patches DoS flaw in its Malware Protection Engine
Microsoft has released an update for its Malware Protection Engine to fix a privately reported security vulnerability that could allow a denial of service if the Microsoft …
Featured news
Resources
Don't miss
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)
- Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
- AI is changing cybersecurity roles, and entry-level jobs are at risk
- From cleaners to creepers: The risk of mobile privilege escalation