U.S. Army cyber forces to get new rules of engagement
“We now live in a world of weaponized bits and bytes, where an entire country can be disrupted by the click of mouse. There are new missions we must take on as a …
Can you trust your online backup service?
While having lots of digital storage space at your physical location may be cheap nowadays, it’s also very useful to have offsite backups – not only in the event …
Most Internet users have fallen victim to malware
The current state of cyber-security has left US Internet users anxious about hacks and password theft. Despite constant victimization, the majority are not using two-factor …
Abuse of mobile app permissions
McAfee Labs found that under the camouflage of “free” apps, criminals are able to get consumers to agree to invasive permissions that allow scammers to deploy …
Explore, analyze and visualize data in Hadoop
Splunk announced the beta version of Hunk: Splunk Analytics for Hadoop, a new software product that integrates exploration, analysis and visualisation of data in Hadoop. Hunk …
Lord Sebastian Coe to keynote RSA Conference Europe 2013
RSA Conference announced Olympic champion, politician and former chair of the 2012 Summer Olympic & Paralympic Games, Lord Sebastian Coe to its lineup of keynote speakers …
Technology and the death of privacy
After the PRISM scandal broke, there were a lot of those who said “So what? I have nothing to hide”, but I am convinced that they didn’t do a lot of thinking …
Facebook bug leaked more info than company reported?
Last Friday, Facebook tried to make its latest disclosure of an information-leaking bug as low-key as possible, but luckily there were researchers who actually analyzed the …
Facebook squashes critical account hijacking bug
A U.K.-based security researcher has shared details of a recently patched Facebook vulnerability that he discovered and for which he received $20,000 via the the social …
Opera infrastructure compromised, users hit with malicious update
A breach of the Opera Software internal infrastructure has resulted in the theft of an expired Opera code signing certificate and used it to sign a piece of malware, package …
Citadel Trojan automatically localizes fraud content
Any successful business knows that it cannot rely solely on one market for future growth. Software companies often conduct business in multiple international markets and …
Attitudes towards data protection and encryption in the cloud
An increasing number of organizations are transferring sensitive or confidential data to the cloud despite concerns over data protection, according to the Ponemon Institute. …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains