Is evading an IP address block to access a website against the law?
A ruling in a lawsuit mounted by Craigslist and against ad indexing firm 3Taps has once again brought attention to the Computer Fraud and Abuse Act (CFAA), its vague wording, …
MitB malware targets steam
When cybercriminals use Man-in-the-Browser (MitB) malware to commit online fraud, financial institutions are not their only targets. Dating, eCommerce, hospitality, and travel …
Groklaw shuttered because email is no longer safe
Since 2003, Pamela Jones – then a simple paralegal, now a journalist and editor – covered legal news regarding free and open source software on her law blog …
UK agents detain Greenwald’s partner, destroy The Guardian’s hard drives
It has been an eventful weekend for The Guardian newspaper, its reporter Glenn Greenwald and his partner David Miranda, as the British police held the latter and questioned …
Nmap 6.40 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the …
Why continuous IT cost optimization is essential
After years of tactical cost-cutting, many organizations now face the challenge of continuous IT cost optimization after the realization that optimization practices are never …
EVault backup appliances now with cloud-connected software for failproof recovery
EVault announced a new portfolio of EVault backup appliances, expanding its enterprise-grade appliances to accommodate the backup and recovery needs of any organization …
ENISA analyzes major security incidents in the EU
The European Union Agency for Network and Information Security (ENISA) today issued a new report providing an overview of the major outage incidents in the EU in 2012. The …
Chrome plugin aims to thwart user profiling efforts
Inspired by a piece of fictional software described in Cory Doctorow’s book Little Brother, developer Ben West created a browser plugin that should, in theory, make it …
Scanning the Internet in less than an hour
Scanning the Internet used to be a task that took months, but a new tool created by a team of researchers from the University of Michigan can scan all (or most) of the …
New Zeus variant creates bogus Instagram accounts
If you are familiar with the results of a recently finished study regarding online content popularity that concluded that “likes” beget “likes”, the …
Advanced threats to drive growth in new product segment
As hackers have shifted their ultimate goals from disruption and notoriety to financial and intellectual property theft, the tactics they use have changed accordingly. The …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous