US DOJ accuses journalist of espionage
Last week’s revelation that the U.S. DOJ has successfully subpoenaed two months’ worth of telephone toll records for phones of AP journalist has created quite an …
A closer look at Mega cloud storage
Once a novelty, nowadays many cloud storage services are fighting for their piece of the market in the virtual world. Today I’m taking a look at Mega, a service that …
Aurora attackers were looking for Google’s surveillance database
When in early 2010 Google shared with the public that they had been breached in what became known as the Aurora attacks, they said that the attackers got their hands on some …
“NATO vacancies” phishing email also leads to malware
An interesting and very comprehensive phishing and malware-delivery campaign has been spotted by Webroot researchers. The attackers are posing as the chief of NATO’s …
CISOs need to engage with the board
Cyberspace has placed information risk firmly on the boardroom agenda, and CISOs need to engage with their boards to ensure their organizations understand and manage …
Find TrueCrypt and BitLocker encrypted containers and images
Passware announced that Passware Kit Forensic 12.5 can now recognize hard disk images and containers, such as TrueCrypt, BitLocker, PGP, during a computer scan. For a computer …
Wi-Fi client security weaknesses still prevalent
Google Android, Apple iOS, BlackBerry, and Windows Mobile devices have an inherent security weakness in the method they use for connecting to Wi-Fi networks that has the …
Sourcefire goes beyond the sandbox
Sourcefire introduced malware trajectory capabilities across its Advanced Malware Protection portfolio, giving customers visibility into malware attack activity and enabling …
U.S. Congress has questions about Google Glass and privacy
Members of the U.S. Congress’ Bi-Partisan Privacy Caucus have sent an open letter to Google CEO Larry Page, questioning the company’s privacy consideration when it …
Jailed hacker designs device to thwart ATM card skimming
A Romanian hacker that has been jailed for his involvement with a criminal gang that planted ATM skimmers and stole card information has designed a new device aimed at …
Cyber espionage campaign uses professionally-made malware
Trend Micro researchers have discovered a new, massive cyber espionage campaign that has been hitting as many as 71 victims each day, including government ministries, …
Digital Government Strategy progress and challenges
A new report by Mobile Work Exchange and Good Technology examines Federal agencies’ progress toward the Office of Management and Budget’s (OMB) Digital Government …
Featured news
Resources
Don't miss
- Product showcase: iStorage diskAshur PRO3
- As AI tools take hold in cybersecurity, entry-level jobs could shrink
- Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025-54309)
- How to land your first job in cybersecurity
- World Health Organization CISO on securing global health emergencies