OpenSSL site hack wasn’t the result of vulnerability exploitation
After a few days of speculations fuelled by a not clear enough explanation, the OpenSSL Foundation has confirmed that the late December defacement of its Openssl.org website …
Critical backdoor in Linksys and Netgear routers found
A backdoor in some Linksys and Netgear wireless routers that allows malicious users to reset the devices’ configuration to factory settings and, therefore, to default …
Mariposa bot author sentenced to prison
Matjaz Skorjanc, a.k.a. Iserdo, was sentenced to four years and ten months in prison last week by the District Court in Maribor, Slovenia. He was found guilty of manufacturing …
FireEye acquires Mandiant
FireEye has acquired privately held Mandiant, a provider of advanced endpoint security products and security incident response management solutions. The transaction closed on …
Researchers demonstrate SD memory card hacking
Security researchers Andrew “bunnie” Huang and Sean “xobs” Cross have demonstrated that the only way to be absolutely sure that no one will be able to …
4.6M Snapchat users’ info compromised in breach
It took just a week for someone to take advantage of the full disclosure of several (at the time) unpatched Snapchat vulnerabilities, and the result is a published list of 4.6 …
Consumers trust government bodies more than private organizations?
Despite high profile surveillance and data gathering incidents, consumers still appear to trust government bodies more than private sector organisations when it comes to …
Key trends in ransomware, evasion techniques and social attacks
McAfee Labs released a predictions report, analyzing 2013 trends through its Global Threat Intelligence (GTI) service to forecast the threat landscape for the coming year. In …
What can we expect next year?
WatchGuard revealed its annual security predictions for 2014. Assembled by WatchGuard’s security research team, the list includes expected advances in ransomware, …
Sophisticated and targeted attacks on the horizon
As 2013 draws to a close, Gavin Millard a security expert from Tripwire gazes into his crystal ball and predicts what 2014 has in store for us. Targeted mobile attacks will …
New book on implementing business continuity according to ISO 22301
“Becoming Resilient: The Definitive Guide to ISO 22301 Implementation” describes the process of implementing business continuity according to ISO 22301, an …
Will 2014 be the year of encryption?
Security experts at Unisys predicted that the coming year will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground