Why endpoint backup is critical
Enterprises are at an increasing risk for data loss due to the growing amount of company data stored on endpoints—the laptops, smartphones, tablets and other devices which …
Open Crypt Audit Project considers taking over development of TrueCrypt
The unexpected notice saying TrueCrypt isn’t safe, which has apparently been posted last week by the developers of the software, took the security community by surprise …
Introducing the Security Culture Summer School
The infosec community has complained about awareness training failures and wasting time and effort on awareness trainings for quite some time. A consensus has emerged that for …
Fake Android soccer gaming apps just show ads
As the soccer world cup in Brazil is coming close, the offering of soccer-related apps on the Google Play store is big, at least 125 different vuvuzela apps are available. …
IBM eliminates fraudulent behavior in the cloud
IBM has patented a technique that helps online and cloud-based businesses improve their ability to eliminate fraud by analyzing browsing behavior to determine whether …
NIST requests comment on proposed SHA-3 cryptographic standard
The National Institute of Standards and Technology (NIST) has requested public comments on its newly proposed SHA-3 Standard, which is designed to protect the integrity of …
WatchGuard integrates wired and wireless network security
WatchGuard has announced that its UTM and NGFW appliances allow users to deploy, configure and manage both wired and wireless network security through a single device in a …
Week in review: Apple devices hijacked in blackmail scheme, inside the malware war zone, and hacking for the greater good
Here’s an overview of some of last week’s most interesting news, interviews, reports and articles: In wake of breach, eBay has to deal with multiple web …
What inspired you to start hacking?
This is a question that Jennifer Steffens, IOActive CEO, often asks hackers she meets on conferences around the world. More often than not, the answer is movies: War Games, …
Walking through Hack In The Box 2014 Amsterdam
This year’s Hack In The Box conference is being held at the De Beurs van Berlage, which is an impressive venue located in central Amsterdam. The organization, the …
Malware creation breaks all records! 160,000 new samples every day
Malware creation has broken all records during this period, with a figure of more than 15 million new samples, and more than 160,000 new samples appearing every day, according …
Dissecting April’s malicious spam
Malicious attachments in April came disguised as e-greetings and notifications about faxes. In the case of the former, alleged Easter greetings turned out to be the …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous