Study on private vs public sector software glitches
In the private sector, software errors are causing both financial and reputational damage. A new study identified private sector businesses in the banking, retail and mobile …
Syrian hackers target White House staffers, Reuters
The Syrian Electronic Army has been busy over the last few days, and has managed both to hijack the official Reuters Twitter account and to compromise personal email accounts …
Security complexity and internal breaches are key concerns
Growth in external hacking attempts, DDoS and malware attacks, and internal threats to data are the key security concerns for UK businesses. 64% of respondents to a Check …
FTC crackdown on “free gift card” scammers
The FTC has moved to shut down an international network of scammers that sent millions of unwanted text messages to consumers, using the lure of “free” gift cards …
Sharp increase in blended, automated attacks
FireHost announced its latest web application attack statistics, which track the prevalence of four distinct types of cyberattacks that pose the most serious threat to …
Norman Shark updates Malware Analyzer G2
Norman Shark announced Malware Analyzer G2 (MAG2) 4.0, which provides hybrid analysis, and Network Threat Discovery (NTD) 5.1, a cyberattack discovery system that …
nPulse updates its flow and packet capture appliance
nPulse released a new version of its Capture Probe eXtreme (CPX) flow and packet capture appliance, which provides a packet indexing solution at 30 million packets per second. …
Hijacking ships and planes with cheap GPS spoofers and laptops
After demonstrating a successful GPS spoofing attack against a drone (UAV – unmanned aerial vehicle) last June, Cockrell School of Engineering Assistant Professor Todd …
Apple Dev Center partially back online, still no details about the hack
Parts of the Apple Developer Center are back online after a week long outage caused by an unnamed intruder that has “attempted to secure” personal information of …
Pinterest joins Twitter in supporting Do No Track
Pinterest, the popular pinboard-style photo-sharing website, has announced a couple of big changes, and among them is the Do Not Track (DNT) feature. “We want you to …
To achieve good security, you need to focus on business
In September 2001, as the Nimda computer worm devastated networks worldwide, we in IT security thought that the management will finally wake up and see how important it was to …
The future of phishing: Credit card redirection
Cyber crooks will go at great lengths to get their hand on users’ credit and debit card information. Usually they try to trick them with spoofed emails that lead to …
Featured news
Resources
Don't miss
- Windows 10: How to get security updates for free until 2026
- XBOW’s AI reached the top ranks on HackerOne, and now it has $75M to scale up
- Why the SOC needs its “Moneyball” moment
- From posture to prioritization: The shift toward unified runtime platforms
- Why should companies or organizations convert to FIDO security keys?