Reveton changes tack, relies on fake AV
When it comes to the infamous Reveton ransomware, cyber crooks are forever coming up with additional ways to bilk money from users: pairing it up with banking Trojans, playing …
Facebook rolls out Graph Search for English speaking users
Graph Search, the semantic search engine whose Beta version Facebook introduced in March 2013, has been made available for everybody who uses the US English language. The …
Linux banking Trojan offered for sale
Windows users are by far the most targeted ones by malware-wielding criminals, but that doesn’t mean that OS X and Linux users should feel impervious. In fact, RSA …
Chrome not the only browser that stores plain-text passwords
When choosing to import his Safari bookmarks and settings into Google’s Chrome browser, software developer Elliot Kember discovered that although it seemed like he could …
Security intelligence through configuration auditing
Modern systems have a multitude of configuration elements that, ideally, meet the IT business requirements of the organization. The danger of having poorly configured systems …
Compliance no longer main driver of security measures
The need to ensure compliance with regulations should no longer be the primary consideration of CIOs when planning IT risk and security measures. Gartner said compliance is an …
Silent Text for Android now on Google Play
Silent Text for Android is now available for download in the Google Play store. It allows you to have secure and encrypted peer-to-peer text conversations on your mobile …
Experienced employees more important than a rising security budget
Tripwire announced the results of a survey of 167 attendees at Black Hat USA 2013. Many of those surveyed – 44 percent – said that if they could change one thing …
Free tool for auditing Google Apps
BeyondTrust released PowerBroker Auditor for Google Apps, available for free, to the BeyondTrust user community. The tool was developed to ease the burdens associated with …
Analyzing the Fort Disco bruteforce campaign
In recent months, several researchers have highlighted an uptick in bruteforce password guessing attacks targeting blogging and content management systems. Arbor ASERT has …
Most companies don’t have data breach cyber insurance
Companies now rank cyber security risks as greater than natural disasters and other major business risks, according to a new Ponemon Institute study. While only 31 percent of …
Compromising Google Accounts and enterprises via flaw in Android SSO
When it comes to Android, Google has traded security for convenience, says Tripwire security researcher Craig Young. During his recent presentation at Def Con in Las Vegas, he …
Featured news
Resources
Don't miss
- Product showcase: iStorage diskAshur PRO3
- As AI tools take hold in cybersecurity, entry-level jobs could shrink
- Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025-54309)
- How to land your first job in cybersecurity
- World Health Organization CISO on securing global health emergencies