Twitter wisdom: April 9, 2013
Here’s food for thought from people you should be following on Twitter. Actually it strikes me dentistry and infosec are similar. We both breach prevention better than …
The cloud: Storms on the horizon
At its heart, the cloud is really just shorthand for shared resources. The cloud is regularly touted as the answer to all of your IT woes. But, beyond the marketing pitches …
New HP server for social, cloud and big data
HP unveiled the HP Moonshot system, delivering new infrastructure economics by using up to 89 percent less energy, 80 percent less space and costing 77 percent less, compared …
Bitcoin-mining Trojan lurking on Skype
Bitcoin-mining malware is nothing new, but with the success of Bitcoin and the renewed interest it is receiving lately, cyber crooks are again concentrating their efforts to …
Anonymous and affiliates attack Israeli websites
As announced, hacker groups affiliated with Anonymous have joined in the attacks on Israeli web properties. By launching “Operation Israel”, the hacktivist …
Spear-phishing emails targeting energy companies
Information over-sharing can lead to cleverly executed and dangerous spear-phishing campaigns, warns the US Department of Homeland Security and the ICS-CERT. According to an …
WordPress.com adds 2-factor authentication option
WordPress users can finally secure their account(s) with two step authentication. The optional feature has been rolled out on Friday and is accessible to all users. To set it …
New Splunk App for Windows
Splunk announced Splunk App for Windows 5.0 , which delivers enterprise-class monitoring for Microsoft Windows Server. It enables users to monitor their end-to-end …
Generalized single packet authorization for cloud computing environments
Cloud computing environments such as those provided by Amazon and Google can be your passport to powerful computing resources without having to worry about typical …
The rise of everyday hackers
Veracode released its annual State of Software Security Report, which includes research on software vulnerability trends as well as predictions on how these flaws could be …
Week in review: Carberp Trojan developers arrested, thousands of compromised Apache servers directing users to malware
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Hackers attacking US banks are well-funded, expert says The Cyber …
iMessage encryption stumps US federal agents
A recent investigation conducted by US Drug Enforcement Administration agents has been temporarily derailed after they failed to decrypt messages the targets exchanged via …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform