Microsoft patches critical vulnerabilities, secures IE
At first take, it looked like Microsoft would continue the 2014 trend of keeping patch Tuesday relatively light. There were only 5 advisories this month, two critical, three …
Security concerns holding back data center consolidation
Security concerns are preventing businesses from unlocking the potential benefits of data center consolidation and cloud services, according to SafeNet. The research, which is …
Older Flash Player vulnerability exploited in the wild
Microsoft researchers have also recently discovered several attacks in the wild exploiting another Flash Player vulnerability (CVE-2013-5330) on Windows, Linux and OS X. This …
Microsoft introduces multifactor authentication for all Office 365 users
In a praiseworthy move, Microsoft has extended the multifactor authentication option to all users of Office 365, its popular subscription-based online office software suite. …
DDoS attack toolkit simplifies the launch of large reflection attacks
Prolexic Technologies issued a high alert DDoS attack threat advisory on the DNS Flooder v1.1 toolkit. The toolkit makes it faster and easier for malicious actors to launch …
Beware of Trojanized Flappy Bird game
Trojanized versions of Flappy Bird, the mega-popular iPhone and Android game that has recently been pulled from Google Play and Apple’s App Store by its creator, have …
Encryption use continues to grow
Use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber attacks and yet there are still major challenges in …
Sophisticated cyber-espionage tool uncovered
Kaspersky Lab discovered “The Mask” (aka Careto), an advanced Spanish-language speaking threat actor that has been involved in global cyber-espionage operations …
LinkedIn does away with controversial email service
LinkedIn has announced that it’s doing away with some of its services, and among these is Intro, a tool that allowed iPhone users who installed it to view in the email …
Three US medical device makers breached?
The computer networks of three big medical device makers have been breached by still unknown attackers that were likely after the companies’ intellectual property, the …
Governments unprepared for the impact of the big five IT trends
A new MeriTalk study, underwritten by Brocade, examines how the implementation of the Big Five – data center consolidation, mobility, security, big data, and cloud …
Sochi security forbids journalists to use private Wi-Fi
The Winter Olympics in Sochi are under way, and we have already written about the cyber risks awaiting visitors and viewers. But what about the ones awaiting the visiting …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous