Windows 10 will not come with built-in keylogging capabilities
In case you missed it, a big fuss has been raised about the keylogging and other “spying” capabilities of the recently released Technical Preview version of …
How does spam affect your business?
68% of organizations have seen their day-to-day business operations severely disrupted or completely stopped as a result of at least one spam-related incident in the last year …
Yahoo says its servers weren’t Shellshocked
After researcher Jonathan Hall’s claims that a group of hackers has been exploiting the Bash Shellshock vulnerability to compromise a number of servers belonging to …
Android browser SOP bypass bug: Who’s affected, and what to do?
A security researcher has recently discovered not just one but two vulnerabilities in the Android Open Source Project (AOSP) browser that could allow attackers to bypass the …
Every fifth Android user faces cyber attacks
A total of 1,000,000 Android device users around the world encountered dangerous software between August 2013 and July 2014, according to the results of a survey carried out …
Apple updates XProtect to kill iWorm botnet threat
Apple has released an update for its XProtect anti-malware system which makes it detect three different version of the iWorm OS backdoor malware discovered last week by AV …
Hackers exploit Shellshock bug, compromise Yahoo, WinZip servers
A group of hackers has successfully leveraged the recently discovered Bash Shellshock vulnerability to compromise a number of servers belonging to Yahoo, Lycos and Winzip, and …
ISACA releases Cybersecurity Fundamentals Certificate
ISACA launched the Cybersecurity Fundamentals Certificate. Intended for university students and recent graduates, entry-level security professionals, and those seeking a …
AT&T suffers another insider breach
US telecom AT&T has lately been having problems with malicious insiders, and the latest incident has resulted in the compromise of account and personal information of a …
Exabeam announces user behavior security technology
Exabeam launched its platform, which adds a layer of user behavior intelligence on top of existing SIEM and log management repositories to give IT security teams a view of the …
Who’s at risk of identity theft?
A new nationwide survey by the AARP shows that consumers continue to put themselves at risk of identity theft by ignoring simple protection tips like shredding personal …
Week in review: JPMorgan Chase breach, iOS spyware, and BadUSB attack code
Here’s an overview of some of last week’s most interesting news and articles: Bash Shellshock bug: More attacks, more patches As vendors scramble to issue patches …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down