EFF staff targeted in state-sponsored espionage campaign
For the first time since the organisation’s inception, Electronic Frontier Foundation’s staffers have been hit with a targeted malware attack by what appear to be …
Starbucks fixes password-related flaw in its iOS app
If you have followed last week’s hullabaloo about the Starbucks iOS app found storing passwords and location coordinates in clear text, and you have been worried about …
Speakers boycotting RSA Conference will speak at TrustyCon
Security consulting firm iSEC Partners, the Electronic Frontier Foundation (EFF) and DEF CON have announce that they will be kicking off a brand-new security technology …
Week in review: Target POS malware, Bitcoin insurance, and the future of net neutrality
Here’s an overview of some of last week’s most interesting news, videos and articles: The biggest challenge to IT security is marketing Most companies today are …
Researcher demonstrates SCADA zero-day, shares PoC
An Italian researcher well known for his exploration of industrial control systems (ICS) has demonstrated the exploitation of a zero-day flaw that can crash or lead to a …
NSA collects 200 million text messages a day
As the world awaits US President Obama’s official announcement of his plans for an NSA reform, The Guardian disclosed details of yet another NSA bulk data collection …
Bruce Schneier briefs US Congress on the NSA
Well known cryptographer and computer security expert Bruce Schneier has been called in to brief six members of the US Congress. The group, consisting of Representatives Zoe …
Researchers share more details about the Target POS malware
A handful of security companies have been researching the Target breach, and the information they unearthed is slowly trickling out to satisfy the public’s curiosity as …
Silk Road forfeits $28 million in Bitcoins
Preet Bharara, the United States Attorney for the Southern District of New York, announced the forfeiture of approximately 29,655 Bitcoins (which, at today’s Bitcoin …
Major developments that will drive Big Data in 2014
Companies are compelled to uncover real value in their data, and they’re turning to Hadoop as a key part of their data center strategy. In 2014, data centers will move …
How to implement incident reporting in cloud computing
Cloud security incidents often catch the media’s attention as they affect large number of users. For example, recently a large storage service provider suffered an …
Symantec seeks to patent technology for spotting malicious torrents
In most people’s minds, the concept of torrents is generally associated with pirated content. Despite this, everyone should know that BitTorrent is a file transfer / …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous