Why wiping decommissioned IT assets should be a must
Last week I’ve written about the ways confidential data can leak outside the organization if the IT security team doesn’t pay attention to printers, shredders, or …
Attackers breach and encrypt TV station’s email server
The email server of FOX21 News has been hacked over the weekend and the information it contained held ransom. The attackers were asking for $5,000 to decrypt the information …
U.S. media sites compromised, lead to malware
At least five U.S. media sites and a number of other popular ones have been compromised and are redirecting visitors to malicious URLs, Zscaler warns. The sites have been …
A radical shift in security needs
During the last 40 years we’ve seen a small number of significant, user-driven shifts in the computing landscape, which change the way businesses and IT departments …
Increase Facebook privacy with Safe Profile
76 percent of consumers are concerned about their privacy when they share their life on social platforms. Facebook’s array of privacy settings, which enable users to …
Analyzing 450 million lines of software code
A new Coverity report details the analysis of more than 450 million lines of software code through the Coverity Scan service. The service, which began as the largest …
Many social accounts are still in danger
The recent hacking of the Associated Press’ Twitter account has begged the question, how secure are social media accounts? A study released by IObit reveals that 30% …
Malwarebytes backup service prevents malware uploads
Malwarebytes Secure Backup, released today, is an online backup service that automatically scans files for malware prior to backup, removing the threat of saving or sharing …
Dell acquires Enstratius
Dell today announced the acquisition of Enstratius, which helps organizations manage applications across private, public and hybrid clouds, including automated application …
IE8 0-day used in watering hole attacks
Last week a U.S. Department of Labor website was discovered to be redirecting users to sites serving a hard-to-detect variant Poison Ivy backdoor Trojan. Researchers are now …
McAfee to acquire Stonesoft
McAfee and Stonesoft today announced a definitive agreement to initiate a conditional tender offer for the acquisition of Stonesoft for approximately $389 million in cash. …
Malware you can “live with”, but shouldn’t
The main symptom of a computer being infected with the ZeroAccess (or Sirefef) malware is that online searches via Google Search often lead to unhelpful pages filled with ads …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform