Can we expect a cyberwar resurgence?
Neohapsis security experts predict that next year there will be a cyberwar resurgence, the cloud will begin to show its hidden costs, and privacy will continue to lose in the …
Verify your software for security bugs
Verification is an important phase of developing secure software that is not always addressed in depth that includes dynamic analysis and fuzzing testing. This step allows …
A new Linux worm targets the Internet of Things
A new Linux worm – luckily still not spotted being used in the wild – has been unearthed by Symantec researchers. Dubbed “Darlloz”, its targets are not …
Researchers track down members of Nigerian cyber gang
A cybercriminal gang based in Nigeria has been setting up phishing and 419 scam campaigns as well as delivering information-stealing malware to targets around the world, say …
Secure cloud storage service MEGA releases iOS app
MEGA is a secure cloud storage service with 50 GB free storage space. The official MEGA iOS app is now available on the App Store. Features: Browse and manage your MEGA cloud …
Malware creation hits record-high numbers
PandaLabs has published the results of its Quarterly Report for Q3 2013. One of the main conclusions that can be drawn from this global study is that malware creation has hit …
Beware of online dangers lurking this Cyber Monday
Cyber Monday is often regarded as the beginning of the holiday shopping season, but many vendors are rolling out deals early as to entice online users to visit their web sites …
Open source crypto server for thwarting malicious insiders
Edward Snowden’s successful exfiltration of mountains of data from NSA systems and databases has once more put the spotlight back on the threat that insiders pose to …
$1M lost in attack against Bitcoin Internet Payment Services
Copenhagen-based Bitcoin Internet Payment Services (BIPS) has been hit with a DDoS attack and has had 1,295 BTC stolen (a little over $1M) mostly from the company’s own …
AutoCAD malware paves the way for future attacks
A piece of malware masquerading as an AutoCAD component with the goal of making systems vulnerable to later exploits has been analyzed by Trend Micro researchers. Unlike the …
The rise of unsolicited and malicious emails
October saw spammers exploiting the themes of upcoming holidays, the names of well-known telecommunication service providers and the conflict in Syria, according to Kaspersky …
F-Secure launches KEY, a secure password manager
F-Secure Key safely stores your passwords, user names and other credentials so that you can access them wherever you are through one master password. Your personal data is …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground