Attackers rope DVRs in bitcoin-mining botnet in record time
How long does it take for one out of the box digital video recorder to be compromised with malware once the device has been connected to the Internet? The unfortunate answer …
25% of breaches go undetected for more than a day
Recent data breaches have had little impact on the security controls of retail and financial organizations, according to Tripwire. Of the 102 financial organizations and 151 …
It’s World Password Day: Change your passwords
Today (May 7) is World Password Day – a day dedicated to promoting the use of strong passwords and the creation of good habits when it comes to choosing passwords. …
2014 starts with record-breaking malware traffic
AppRiver released a detailed analysis of web and email-borne threats and malware trends traced between January and March 2014. During the first quarter of 2014, AppRiver …
Wi-Fi Smart Plug: Control devices from anywhere
D-Link announced the Wi-Fi Smart Plug (DSP-W215), which allows users to monitor and control their home’s electronic devices from anywhere. Using the free mydlink app for …
Dropbox fixes link-sharing data-leaking flaw
Popular file hosting service Dropbox has announced that it has patched a vulnerability that would make privately shared links accessible to those for whom they weren’t …
Password management done right
David Sancho, senior threat researcher with Trend Micro, has recently written a short but good post in which he pointed out the reasons why despite their inherent insecurity, …
Reset the Net action aims to thwart online mass surveillance
A group of over 30 Internet companies and civil liberties, environmental and political organizations have announced a global call to action aimed at making mass Internet …
“Facebook deactivation” scam doing rounds
A curious like-harvesting scam is doing rounds on Facebook, threatening users with account deactivation if they don’t go through the steps defined in scammy status …
Windows flaw allows access to data after accounts are revoked
A disabled account in Windows’ network does not take effect immediately, according to Aorato. In fact, due to design considerations disabled accounts – and the …
Embedding positive security behaviors is essential
Organizations have spent millions over recent decades on information security awareness activities. The rationale behind this approach was to take their biggest asset – …
Cybergangs accelerating velocity of targeted brand development
Cybercrime gangs are accelerating their substitution of targeted brands at an alarming new pace, according to a new APWG report. Of the 681 targets that were phished in 2H …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous