Obama orders NSA to stop spying on UN diplomats
There is nothing wrong with spying on foreign national leaders, even when they are allies, said NSA head General Keith Alexander and NI director James Clapper at a hearing …
Women crucial for taking infosec industry to next level
Women represent only 11 percent of the information security workforce yet they have the academic background and diverse perspective necessary to accelerate change in the …
When the phone call is more dangerous than malware
During Social Engineer Capture the Flag contest, one of the most prominent and popular annual events at DEF CON 21, a pool of 10 men and 10 women, from diverse backgrounds and …
Secure corporate BYOD solution by ForeScout
ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination …
RSA takes a big data approach to help with high-risk threats
RSA, The Security Division of EMC, at RSA Conference Europe 2013 unveiled RSA Vulnerability Risk Management (VRM), a new software solution designed to help organizations …
US legislators introduce bill to end dragnet phone data collection
US Senate Judiciary Committee Chairman Patrick Leahy and Congressman Jim Sensenbrenner, chairman of the Crime and Terrorism Subcommittee in the House, introduced on Tuesday a …
AmEx users targeted with well-crafted phishing scheme
A rather well-executed phishing campaign is targeting American Express users via fake “Fraud Alert: Irregular Card Activity” emails impersonating the AmEx Fraud …
Syrian hackers hijack Obama’s tweets
The Syrian Electronic Army has apparently managed to modify tweets from Barack Obama’s official Twitter account to include links to a pro-Assad video, as well as …
Photoshop source code stolen, 38M users affected in Adobe hack
Remember the successful attack against Adobe’s networks made public earlier this month? Well, as it turns out, the damage is larger than initially thought. Early results …
The future? Big data and intelligence driven security
As we produce and consume an increasing amount of digital data, even the casual user is becoming aware that the way we store and access this data will continue to shift and …
93% of firms increasing cyber-security investments
93% of companies globally are maintaining or increasing their investment in cyber-security to combat the ever increasing threat from cyber-attacks, according to a new survey …
Centralizing threat intelligence to feed network defense systems
ThreatConnect announced the launch of a prototype that connects commercial security products with advanced threat intelligence through an open source standard known as the …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services