Japan holds first hacking contest backed by government
Despite being one of the greater world economies and being technologically advanced as few others, Japan has woken up to the reality of cyber crime relatively late. The highly …
Oracle releases MySQL 5.6
Oracle today announced MySQL 5.6, the world’s most popular open source database. With increased performance, scalability, reliability and manageability, MySQL 5.6 helps …
Ad network site hack results in popular sites flagged as malicious
Google Chrome users trying to visit a slew of popular news sites such as the New York Times, the Washington Post, ZDNet and the Huffington Post on Monday were faced with …
Fake Amazon Kindle receipt leads to persistent malware
Amazon customers buying e-books for their Kindle or other mobile devices should be careful with emails that seemingly containing receipts for their purchases, warns Webroot, …
Digital certificates and malware: a dangerous mix
In the past few days we have heard several stories about major corporations getting hacked and their security systems completely bypassed. If anything, that should remind us …
Business is booming for exploits, mobile malware
Business is thriving for exploits, mobile malware is still dominated by Android and Symbian, and botnets are back and retooled, according to a new threat report from F-Secure …
Cisco unveils open networking “fabric” for data centers, clouds
Network speed, latency, and greater network port density in a single unit are key considerations for customers deploying virtualized data centers and moving to a managed cloud …
Hackers breach U.S. Energy Department networks
Notifications sent out to employees and contractors of the U.S. Department of Energy have confirmed that it and its networks have been the latest victim of …
FTC urges mobile platforms to consider offering Do Not Track
The explosive growth of mobile services allows consumers to do things that would have been hard to imagine only a few years ago, but at the same time, mobile technology raises …
Dutch hacker imprisoned for trafficking 100,000 credit cards
A Dutch citizen who was arrested and extradited from Romania was sentenced to 12 years in prison for a computer hacking and credit card fraud scheme that victimized people …
The rise of mobile advertising malware toolkits
In Q4 2012, FortiGuard Labs has highlighted malware samples that show four typical methods cybercriminals are using today to extract money from their victims. In addition, the …
Citadel Trojan used in unusual targeted attacks
The Zeus/Zbot banking malware and its variants and derivates (such as the Citadel Trojan) have, until now, been used for stealing banking credentials from random users. But …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)