Tor warns of malicious Tor browser offered on the App Store
A public plea made on Twitter by Runa A. Sandvik, a (former?) developer with The Tor Project has turned the spotlight on a still unresolved issue of an apparently fake Tor …
Full Disclosure mailing list closure elicits mixed reactions
The Full Disclosure mailing list has long been the perfect place for security researchers to disclose and discuss newly found vulnerabilities. But John Cartwright, one of its …
Fake Malaysia Airlines Flight 370 video hides a backdoor
As the search for the missing Malaysia Airlines Flight 370 nears the end of the second week, cyber crooks are diversifying the attacks against users curious to know what …
NSA records a country’s phone calls, keeps the records for a month
By leveraging a surveillance system dubbed MYSTIC, the US National Security Agency has been recording all phone calls made in a foreign country for a period of 30 days, newly …
Aversion to new Facebook News Feed could lead to scams
Facebook has been gradually rolling out a new, more simplified design for users’ News Feed for a while now. It’s a given that some users won’t like the …
Edward Snowden: Here’s how we take back the Internet
Appearing by telepresence robot, Edward Snowden speaks at TED2014 about surveillance and Internet freedom. The right to data privacy, he suggests, is not a partisan issue, but …
The Internet of Things will transform the data center
The Internet of Things (IoT) has a potential transformational effect on the data center market, its customers, technology providers, technologies, and sales and marketing …
20% of all malware ever created appeared in 2013
According to the latest PandaLabs report, malware creation hit a new milestone. In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever …
91% of video surveillance deployments involve IT departments
ESG research found that among organizations currently using video surveillance technology, 91% indicate that IT manages or supports these deployments. Of the final survey pool …
25,000 UNIX servers hijacked by backdoor Trojan
The ESET security research team, in collaboration with CERT-Bund, the Swedish National Infrastructure for Computing and other leading agencies, has uncovered a widespread …
Gang wielding ColdFusion exploits expands botnet of hacked e-commerce sites
A German website of French automaker Citro?«n is the latest of the wide array of higher-profile webshop sites that have been compromised by a hacker gang leveraging Adobe …
Trustwave acquires Cenzic
Trustwave announced the acquisition of Cenzic, financial terms were not disclosed. The combination will create an integrated security testing platform designed to help …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous