Week in review: NSA records a country’s phone calls, SSL innovations, and (IN)SECURE Magazine special issue
Here’s an overview of some of last week’s most interesting news, podcasts, reviews, videos, interviews, and articles: US announces transition of oversight over …
NSA targets sys admins to breach computer networks
A newly analyzed document from Edward Snowden’s trove show that the NSA collects personal and account information on system administrators and uses it to compromise …
Bitcoin software update fixes transaction ID malleability bugs
Bitcoin Core – as the Bitcoin infrastructure software has been renamed to in order to avoid confusion with the the Bitcoin network – has been updated to make, …
Microsoft accessed Hotmail account to uncover internal leaker
This week’s charging of a former Microsoft employee for stealing the company’s trade secrets could have passed almost unnoticed were it not for an important detail …
IBM launches new software and consulting services
IBM introduced new software and services to help organizations use Big Data and Analytics to address the $3.5 trillion lost each year to fraud and financial crimes. Through …
Webcast: Beware of the Wild Wild Web
The World Wide Web is wasteland brimming with uncontrolled threats and dangers to IT security. Network and IT managers can prevent those threats from causing damage by …
BlackOS malicious web traffic managing software is on sale
Security researchers are keeping a close eye on underground cybercrime forums and are quick to spot new offerings, such as the BlackOS software package. Not to be confused …
US tech firms knew about and assisted with PRISM data collection
In a testimony before the Privacy and Civil Liberties Oversight Board, the NSA general council Rajesh De and his colleague stated on Wednesday that the tech companies that …
Over 31,000 IoT devices and computers infected by cryptocoin-mining worm
A new version of the Darlloz Linux worm, which targets Internet-enabled devices such as home routers and security cameras, computers running Intel x86 architectures as well as …
Oracle releases Java 8
Oracle has released Java Standard Edition (SE) 8, Java Development Kit (JDK) 8, and Java Runtime Environment (JRE) 8. The new releases work on Windows 8, Windows 7, Windows …
Product pitch: DigiCert Certificate Inspector
SSL Certificates serve as the security backbone of the internet, securing billions of interactions annually. Yet, too often, system administrators fail to properly configure …
Operation dismantles child exploitation enterprise on Tor network
DHS Secretary Jeh Johnson highlighted the complete results of one of the largest online child exploitation investigations in the history of ICE, involving victims in 39 states …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous