Google ups (some) bug bounties
Google has once again decided to raise the sums that researchers can earn by offering information about bugs in the company’s web services and properties (YouTube, …
Changes to the standard for PIN Transaction Security
Today the PCI Security Standards Council (PCI SSC) published version 4.0 of the PIN Transaction Security (PTS) Point of Interaction (POI) requirements. These requirements, …
Pirate Bay founder suspected of hacking police databases
Pirate Bay co-founder Gottfrid Svartholm, who has been extradited from Cambodia to Sweden to answer for allegedly hacking of Swedish IT company Logica and the Nordea bank …
NSA has direct access to Google, Facebook, Apple servers
After yesterday’s news that Verizon is compelled to share all phone call metadata with the NSA on a daily basis comes the incendiary revelation that the spy agency has …
What are users doing after log-in?
Businesses today use up to 50 on-premises applications and 25 cloud-based applications on average, so identity and access management (IAM) technologies to secure data and …
Backup and recovery problems exposed
A Veeam survey of 500 SMBs across the USA and Europe found that they are experiencing significant issues with the cost, complexity and lack of capabilities of their data …
Secure Windows desktops by removing administrator privileges
BeyondTrust released PowerBroker for Windows 6.0, an identity management solution that allows customers to take a system’s overall risk into context when deciding what …
Microsoft to release five bulletins next week
Microsoft released advance notification for next week’s Microsoft patch and it looks like we’re getting only five bulletins. We received several comments on what …
Rogue employees, malware exploits and unauthorized software
While IT security professionals recognize the threat posed by unwitting employees, many still admit to allowing administrative privileges to go unmanaged, making organizations …
Tripwire includes web application scanning with IP360
Tripwire announced that dynamic web application scanning is now included in IP360. This critical functionality enables customers to detect and prioritize web application …
U.S. Veterans Affairs Dept. repeatedly targeted by foreign hackers
Conflicting claims were heard at Tuesday’s hearing of the House Veterans’ Affairs oversight and investigations subcommittee, leaving open the question on whether …
Smart TVs vulnerable to a host of attacks
Smart (connected) TVs are becoming a common fixture in Western world homes, and most users consider it a handy tool and an improvement over the basic television sets of …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services