Downtime explanation
You’ve probably noticed we were offline yesterday for nearly 13 hours. The problem was with our hosting provider, Sago Networks, who reportedly experienced an issue with …
Samsung Galaxy S5 fingerprint scanner can be tricked
Samsung’s newly released Galaxy S5 phone sports a fingerprint scanner embedded in the home button that works well but unfortunately, like iPhone 5S’ TouchID before …
Security pros actively hiding negative facts from executives
A new Ponemon Institute study exposes a severe gap in security visibility and perception between C-level executives and IT security staff. In nearly 60 percent of the …
ModSecurity 2.8.0 released
ModSecurity makes full HTTP transaction logging possible, allowing complete requests and responses to be logged. It can also monitor the HTTP traffic in real time in order to …
Heartbleed threatens mobile users
As time passes, it becomes more and more obvious that almost no-one is safe from the danger created by the existence of the OpenSSL Heartbleed bug. In the days after the …
The security of the most popular programming languages
A new WhiteHat Security report takes a deeper look into the security of a number of the most popular programming languages including .Net, Java, ColdFusion, ASP and more. …
Hardware manufacturer LaCie suffered year-long data breach
French computer storage hardware manufacturer LaCie has suffered a data breach that affected a yet unconfirmed number of their customers. “On March 19, 2014, the FBI …
Heartbleed: VMware starts delivering patches
VMware has announced that it has started shipping patches for its products that have been impacted by the OpenSSL Heartbleed bug. “VMware is acutely aware of the …
Half of IT pros make undocumented changes to IT systems
57% of IT professionals have made undocumented changes to their IT systems that no one else knows about; while as many as 40% of organizations don’t have formal IT …
Businesses take little action to mitigate the insider threat
While businesses are growing increasingly aware of the insider threat, they still lack enforceable controls to stop and punish perpetrators. A LogRhythm survey of 1,000 IT …
First phase of TrueCrypt audit finds no backdoors
Remember when late last year cryptographer Matthew Green and Kenneth White, Principal Scientist at Social & Scientific Systems, called for – and then organized …
Growing concerns over data privacy
Almost nine in ten (88%) US consumers are at least “a little” concerned about the privacy of their personal data, according to GfK. One in three consumers also …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous