ISACA updates IS Audit and Assurance Standards
ISACA has issued revised Information Systems (IS) Audit and Assurance Standards. The standards have an effective date of 1 November 2013. Introduced in 1988, the IS Audit and …
File infector EXPIRO hits US, steals FTP credentials
An unusual attack has been spotted in the wild, using an unexpected combination of threats. This attack used exploit kits (in particular Java and PDF exploits) to deliver file …
Bank security breaches destroy customer trust
85 percent of U.S. adults with banking accounts are at least somewhat concerned about online banking fraud, according to Entersekt. Such fraud can include phishing, malware, …
Switch secures confidential data on separate networks
Belkin expanded its secure product line with the addition of the Belkin DisplayPort KVM Switch. The new switch offers the ideal solution for federal and defense users who …
Tripwire updates Log Center solution
Tripwire announced the availability of its Log Center TLC 7.0 featuring the first phase of integration with IP360, as well as Tripwire’s new VIA Agent, log intelligence, …
Apps exploiting Android “Master Key” bug offered on Google Play
Researchers from security firm Bitdefender have unearthed two relatively popular apps on Google Play that leverage the infamous Android “Master Key” bug, but …
Android backup sends unencrypted Wi-Fi passwords to Google
The recent revelations on how Internet giants such as Google, Yahoo, Apple and others are compelled by the US government to give its agencies access to user data have …
Researchers find, Google fixes Glass hijack flaw
Google Glass is scheduled to be made widely available to regular consumers by the end of this year, so the Internet giant has still time to fix the most obvious security flaws …
DDoS attacks are getting bigger, stronger and longer
Prolexic Technologies announced that the average packet-per-second (pps) rate reached 47.4 Mpps and the average bandwidth reached 49.24 Gbps based on data collected in Q2 2013 …
Social engineering tops list of help desk security threats
Help desks are most commonly asked to assist users in addressing common IT problems including password resets and application and connectivity issues. Often the performance of …
Vendors patch security vulnerabilities within 3 weeks
High-Tech Bridge Security Research Lab released its statistics on web application security for the first half of 2013. The statistics is based on HTB Security Advisories that …
Many join EFF to sue NSA over illegal surveillance
Nineteen organizations including gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the NSA for violating …
Featured news
Resources
Don't miss
- Product showcase: iStorage diskAshur PRO3
- As AI tools take hold in cybersecurity, entry-level jobs could shrink
- Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025-54309)
- How to land your first job in cybersecurity
- World Health Organization CISO on securing global health emergencies