Persistent adversaries can identify Tor users
Using the Tor network will not you grant perfect anonymity – in fact, a group of researchers from the US Naval Research Laboratory and Georgetown University say that …
NetTraveler APT group is back, adds watering hole attacks to its arsenal
The “Red Star” APT group employing the NetTraveler malware family is still active, but has changed its modus operandi. Its targets remain the same: government …
Training: The Art of Exploiting Injection Flaws
HITBSecConf 2013 Malaysia will host the widely acclaimed course The Art of exploiting Injection Flaws in Kuala Lumpur on 14 and 15 October 2013. This hands-on session will …
Privacy case makes your phone untrackable
With all the recent revelations about NSA’s long cyber reach and the (in)voluntary involvement of big Internet companies and US telecoms in its many surveillance …
Login and password troubles revealed
Increasingly lengthy and complex log-in processes and web forms are driving consumers away from websites, according to Ping Identity. The study revealed that an overwhelming …
The TAO of NSA
In last week’s reports, it has been pointed out that NSA has its own hacking unit called Tailored Access Operations (TAO), and that its capabilities have been tapped for …
Microsoft and Google continue to press US government over transparency
Brad Smith, Microsoft’s general counsel, announced that Google and Microsoft are tired of waiting for the US government to allow them to publish sufficient data relating …
Leaked FinFisher presentation details toolkit’s spying capabilities
F-Secure’s Mikko Hypponen has shared several interesting slides from a presentation that displays the wide range of capabilities offered by the FinFisher commercial …
Most security managers don’t trust their apps
Application vulnerabilities are a major factor in the cybercrime game. More than 500 CISOs and Security managers have been interviewed by Quotium about the security state of …
Government employees realize the importance of cyber security
Despite high awareness in the public sector about cyber-security risks and the threat to national security, government officials feel that not enough attention has been placed …
Fraud and ATM attacks hit Germany hard
FICO released new data showing the high rate of card-not-present (CNP) fraud on Germany’s credit cards in 2012, showing that 70 percent of the 2012 fraud on …
Week in review: Smart building security, Tor usage doubles, and how Snowden stole NSA documents
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: There are no winners in the blame game Every time a major …
Featured news
Resources
Don't miss
- Trojanized SonicWall NetExtender app exfiltrates VPN credentials
- High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218)
- Why work-life balance in cybersecurity must start with executive support
- Reconmap: Open-source vulnerability assessment, pentesting management platform
- Microsoft will start removing legacy drivers from Windows Update