Week in review: Massive DDoS attack targets Spamhaus, Amazon S3 buckets leaking, and cyber espionage deterrence
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: What do users look for in a security solution? Users are aware of …
Spammers bypass spam filters with Google Translate links
Google Translate is the latest trick in spammers’ arsenal for bypassing email spam filters, warn Barracuda Labs researchers. Spam filters work by evaluating (among other …
US starts gradually removing Chinese IT equipment from federal systems
A new law concerning funds given to U.S. federal agencies has been signed by President Obama, and it says that Departments of Commerce and Justice, NASA, and the National …
Microsoft releases privacy and security guide for policy makers
Microsoft released the third volume of its popular policymaker booklet, Building Global Trust Online, which includes considerations and guidance for a number of new …
OpenStack security brief
This video from Shmoocon 2013 is a break down of security concerns relating to OpenStack cloud software. OpenStack is an open source IaaS solution compatible with Amazon EC2 / …
8 in 10 companies suffered web-borne attacks
The vast majority of organizations that allow employees to freely access the Web are experiencing high rates of malware threats, including phishing attacks, spyware, …
Worldwide IT spending to reach $3.8 trillion in 2013
Worldwide IT spending is projected to total $3.8 trillion in 2013, a 4.1 percent increase from 2012 spending of $3.6 trillion, according to the latest forecast by Gartner. …
Backdoor Trojan picks up commands from Evernote account
Trend Micro researchers have recently analyzed a backdoor Trojan that contacts an unusual command and control center – an Evernote account. The backdoor – dubbed …
Global credit card fraud network dismantled
44 members of a global credit card fraud network have been arrested in a joint operation coordinated by the Romanian Cybercrime Unit in Romania, in close cooperation with …
A look at how consumers safeguard their devices
While consumers who have lost a smartphone or had one stolen in the past are significantly more likely to be taking basic protective measures with their current device, nearly …
Ideas for deterring cyber espionage attacks
There has been much talk about whether the cyber espionage attacks should be considered acts of war, and about what can be done to prevent them. Retaliation being hard to …
The Computer Fraud and Abuse Act: Swartz, Auernheimer, and beyond
The Computer Fraud and Abuse Act is controversial for its broad reach and potential for misuse. In this video from Shmoocon 2013, Professor Orin Kerr and Marcia Hofmann from …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform