Canadian spy agency used free airport WiFi to track travelers
A new report based on documents provided by NSA whistleblower Edward Snowden will make Canadians question whether the country’s electronic spy agency does, as it claims, …
Reactions to the Yahoo Mail hack
Unknown attackers have attempted to access a number of Yahoo Mail accounts and urged users to change their passwords even if they haven’t been affected. Here are some of …
Researchers uncover months-old POS malware botnet
With the Target and Neiman Marcus breach being all over the news in the last few weeks, the topic of malware that collects card data directly from Point-of-Sale devices has …
Yahoo Mail accounts compromised in coordinated attack
Unknown attackers have attempted to access a number of Yahoo Mail accounts, the company warned on Thursday, and urged users to change their passwords even if they …
GitHub sets up bug bounty program
GitHub is the latest service to announce that they have started a security bug bounty program. “The idea is simple: hackers and security researchers find and report …
Global view of attack traffic and security
Akamai released its latest report, which provides insight into key global statistics on attack traffic and security. Akamai maintains a distributed set of unadvertised agents …
10,000+ UK systems affected by ICEPOL Trojan ransomware
At least 10,331 successful installs of ICEPOL Trojan ransomware took place in the UK last year. Bitdefender’s Cybercrime Investigation Unit analysed the disk images of …
Beware of bogus Google “Suspicious sign-in prevented” emails
A very convincing phishing attempt aimed at harvesting users’ Google account credentials has been spotted by a security researcher (click on the screenshot to enlarge …
How to recover deleted or corrupted digital currency
The popularity of Bitcoin and other digital / cryptographic currency cannot be denied. Different users like using it for different reasons, but many agree that the question of …
“Honey Encryption” overwhelms attackers with fake results
Former RSA chief scientist Ari Juels is working on an innovative approach at encryption that could make cyber crooks’ like a lot more difficult. This new encryption …
New details about Target breach come to light
As data dumps of cards stolen in the Target breach continue to be sold on underground cybercrime forums, and the stolen information is being used to perform unauthorised …
Check Point discovers critical vulnerability in MediaWiki
Check Point found a critical vulnerability in the MediaWiki project Web platform, a popular open source Web platform used to create and maintain ‘wiki’ Web sites. …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform