(IN)SECURE Magazine issue 37 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 37 has been released today. Table of contents: …
Metasploit supports Kali Linux free security auditing toolkit
Rapid7 is working with Offensive Security to provide official Metasploit support for Kali Linux, the enterprise-ready evolution of BackTrack Linux. The free security auditing …
Tips for removing data from mobile devices
AVG released tips on how consumers can remove their personal data before they recycle or throw away their old smartphones. In an era of frequent and seamless device upgrades, …
Who are the enemies of the Internet?
In their latest report on online surveillance, Reporters Without Borders have named Bahrain, China, Iran, Syria and Vietnam as “state enemies” of the Internet due …
Microsoft releases four critical bulletins
In terms of volume, the March Patch Tuesday is about average, with seven bulletins — four rated “critical” and three rated “important.” In …
Trend Micro introduces new end user protection suite
Trend Micro announced a new suite – Trend Micro Enterprise Security and Data Protection – designed to help companies efficiently mitigate the risks of attacks and …
Zoosk asks users to reset passwords following mass leak
Online dating service Zoosk is urging some of its users to change their passwords following the leaking of a list of some 29 million passwords that seemingly contains theirs. …
First direct silicon-to-photonics-based router family
Compass-EOS announced r10004, the first in a family of next-generation, core-grade modular routers. The r10004 is three times smaller than comparable core routers and supports …
Hackers steal, leak financial info of U.S. celebrities and politicians
Detailed personal and financial information of a number of U.S. celebrities, politicians and a chief of police has been made public by hackers, TMZ reports. The victims of the …
2013 will be the year of larger scale big data adoption
After a few years of experimentation and early adopter successes, 2013 will be the year of larger scale adoption of big data technologies, according to Gartner, Inc. According …
DIY Steam information harvesting tool sends out mass malicious invites
Webroot’s Dancho Danchev has unearthed a DIY Steam information harvester / mass group inviter tool being offer for sale on a number of cybercrime-friendly underground …
MiniDuke does not come only via email
Researchers from Kaspersky and CrySyS Lab continue to analyze the MiniDuke backdoor and have discovered two previously unknown infection mechanisms. Recently discovered to …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform