Travelers targeted by infected travel websites
Proofpoint security researchers recently were the first to discover that a large number of travel destination websites had been compromised and were being used to deliver the …
Security weakness found in WiFi enabled LED light bulb
Researchers at Context Information Security have been able to expose a security weakness in a WiFi enabled, energy efficient LED light bulb that can be controlled from a …
Week in review: DDoS attacks becoming more effective, and how to build trust between business and IT
Here’s an overview of some of last week’s most interesting news, articles and interviews: Gathering and using threat intelligence In this interview, Tomer Teller, …
Microsoft to address six issues on Tuesday
Microsoft has dropped their July 2014 advance security notification and it looks like a relatively light month of patching. Six issues in total, 2 Critical, 3 Important, 1 …
Connecting cloud storage services and cloud-based data loss prevention
CoSoSys released a new version of My Endpoint Protector, a cloud-based Data Loss Prevention (DLP) and Mobile Device Management (MDM) solution for both Macs and PCs. The new …
Estimated $3.75bn stolen by Brazil fraud ring
An estimated $3.75 billion have been netted by a single fraud ring that took advantage of a popular Brazilian payment method – the Boleto – by wielding a …
Spammers are always thinking up new tricks
The percentage of spam in email traffic in May averaged 69.8 per cent – 1.3 percentage points less than the previous month. May saw numerous mass mailings for schools …
Microsoft supports open source software framework for IoT
The AllSeen Alliance, the broadest Internet of Everything open-source project, announced that Microsoft has joined the group’s multi-company effort as a Premier Member …
No-IP reclaims control of domains seized by Microsoft
The end of No-IP customers’ troubles seems near, as Microsoft has relinquished control of the 23 domain names it seized control of on Monday with the blessing of a …
Live open source security lab coming to Cyber Security EXPO
Cyber Security EXPO, part of IP EXPO Europe, is calling for contributors to the Cyber Hack, a live open source security lab arriving at the show this October. The Hack area …
Android HijackRAT poised to hit mobile banking users
A highly versatile piece of Android malware has been unearthed by FireEye researchers. Posing as “Google Service Framework”, the malicious app is capable of …
Exploit switches off Microsoft EMET’s protection features
By leveraging and modifying a “semi-random public exploit” researchers have managed to deactivate all protection features of the latest version of …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous