OpenSUSE forums defaced via unknown vBulletin 0-day
The official forums of the openSUSE Linux distribution have been hacked and defaced by a Pakistani hacker that goes by the handle “H4x0r HuSsY.” According to THN, …
Senior managers are the worst information security offenders
As companies look for solutions to protect the integrity of their networks, data centers, and computer systems, an unexpected threat is lurking under the surface—senior …
What drives salary hikes for IT professionals?
The biggest salary increases for IT professionals are for roles that demand specific experience in big data analytics; ecommerce and mobile; and IT security. Salaries for all …
Top priorities for organisations to counter digital criminality
Martin Sutherland, Managing Director, BAE Systems Detica highlights that the single biggest issue that will hit organisations in 2014 will be the rise of digital criminality …
What are the most effective means for achieving IT ops excellence?
Based on results collected across a variety of industry verticals – including financial services, healthcare, manufacturing, and retail – Continuity …
Triggering deep vulnerabilities using symbolic execution
Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic values to evaluate a large set of parallel program paths …
Deadly new ransomware soon to be released?
As disruptive as Cryptolocker is, there’s a possibility that an even deadlier type of ransomware will soon be targeting unsuspecting users. White-hat security research …
Multi-protocol SoftEther VPN becomes open source
In March 2013, a Japanese student by the name of Daiyuu Nobori set up VPN Gate, a free VPN service that he hoped would be used by Internet users who wish to avoid their …
Palo Alto Networks acquires Morta Security
Palo Alto Networks has acquired Morta Security, a Silicon Valley-based cybersecurity company operating in stealth mode since 2012. Financial terms of the acquisition were not …
Stealing money from ATMs with malware
This talk from the 30th Chaos Communication Congress will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The …
Microsoft releases BYOD best practices for enterprise workers
Microsoft is releasing best practices for enterprise workers who are considering using their personal technology device for work and play. This business trend, known as BYOD, …
New Linksys 802.11AC WRT router allows open source customization
Linksys is bringing back the heritage of the best-selling router of all time – the Linksys WRT54G but updated and modernized it with the most leading edge available …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground