Microsoft and Google continue to press US government over transparency
Brad Smith, Microsoft’s general counsel, announced that Google and Microsoft are tired of waiting for the US government to allow them to publish sufficient data relating …
Leaked FinFisher presentation details toolkit’s spying capabilities
F-Secure’s Mikko Hypponen has shared several interesting slides from a presentation that displays the wide range of capabilities offered by the FinFisher commercial …
Most security managers don’t trust their apps
Application vulnerabilities are a major factor in the cybercrime game. More than 500 CISOs and Security managers have been interviewed by Quotium about the security state of …
Government employees realize the importance of cyber security
Despite high awareness in the public sector about cyber-security risks and the threat to national security, government officials feel that not enough attention has been placed …
Fraud and ATM attacks hit Germany hard
FICO released new data showing the high rate of card-not-present (CNP) fraud on Germany’s credit cards in 2012, showing that 70 percent of the 2012 fraud on …
Week in review: Smart building security, Tor usage doubles, and how Snowden stole NSA documents
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: There are no winners in the blame game Every time a major …
Detailed US intelligence community’s $52.6 billion budget leaked
Leaked by NSA whistleblower Edward Snowden and analyzed by The Washington Post reporters, the summary of the $52.6 billion US National Intelligence Program budget for the 2013 …
Medical lab allegedly exposed consumer info on P2P network
The Federal Trade Commission filed a complaint against medical testing laboratory LabMD claiming that in two separate incidents, LabMD collectively exposed the personal …
Fraud and identity theft camouflaged by DDoS attacks
Prolexic shared attack signatures and details that are helpful to detect and stop DDoS attacks from the Drive DDoS toolkit, an attack tool often used as a source of …
Five ways to get the most out of your sandbox
There’s been a lot of talk lately about the value of sandbox technology as part of a cybersecurity defense. While sandboxes are a valuable tool in the hands of a …
Banking Trojans dominate malware in e-mail traffic
The percentage of spam in email traffic in July was up only 0.1 percentage points and averaged at 71.2 per cent, according to Kaspersky Lab. Malicious attachments were found …
Three factors will impact enterprise cloud adoption
Although the use of cloud services is growing faster than the overall enterprise IT market, it is still a small part of overall IT spending, according to Gartner. A recent …
Featured news
Resources
Don't miss
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)