Stanford University suffers another data breach
Stanford University has suffered another IT breach, and while its scope is yet to be determined, all users of the university’s computer system are advised to change the …
US SEC data leak shows lax data access practices
When a former employee of the US Securities and Exchange Commission left the organization for a job with another federal agency, he “inadvertently and unknowingly” …
Feds to web firms: Hand over encryption keys and user passwords
The US government and its intelligence and law-enforcement agencies have apparently been trying to get Internet firms to hand over both their users’ account passwords …
Preventing the exploitation of human vulnerabilities
Secure Mentem released the Human Incident Response Service to specifically address the issue of exploiting human vulnerabilities. Some of the most noted attacks in recent …
NTODefend now more effectively blocks application vulnerabilities
NT OBJECTives announced that its NTODefend solution now blocks application vulnerabilities by approximately 30% more than the previous version. As a result, NTODefend’s …
Five charged with stealing 160+ million credit card numbers
A federal indictment made public in New Jersey charges five men with conspiring in a worldwide hacking and data breach scheme that targeted major corporate networks, stole …
The impact of weak threat intelligence on organizations
A new Ponemon Institute study, which includes a survey of more than 700 respondents from 378 enterprises, defines what “live threat intelligence” is; how global …
IBM unveils software to identify and predict security risk
IBM announced an integrated security intelligence solution that helps organizations identify key vulnerabilities in real-time. QRadar Vulnerability Manager gives security …
Cyber security is central to long-term economic growth
An increase in attacks on corporate websites should focus attention on the actions businesses should take to reduce the impact of cybercrime. The word of caution comes in the …
Record malware growth in China, Ukraine and Saudi Arabia
51,000 new mobile malware threats were identified in the first half of 2013, infecting an estimated 21 million mobile devices, according to NQ Mobile. Highlights of report …
TOR-based botnets on the rise
Keeping their botnet’s C&C centers online is crucial for bot herders, so that they can keep taking advantage of the computers they zombified. But given that cyber …
US lawmakers shoot down legislation for limiting NSA spying
An amendment to the Department of Defense Appropriations Act of 2014 that would curtail funding for NSA’s collection of electronic communication data in cases where the …
Featured news
Resources
Don't miss
- Building cyber resilience in always-on industrial environments
- Breaking the cycle of attack playbook reuse
- Kanister: Open-source data protection workflow management tool
- Flaw in Notepad++ installer could grant attackers SYSTEM access (CVE-2025-49144)
- Windows 10: How to get security updates for free until 2026