Researchers reveal the identity of a Chinese hacker
It all started with Joe Stewart, director of malware research at Dell SecureWorks, who when investigating an unusual piece of malware and the command nodes which it contacted …
Most Americans think cyber warfare is imminent
A national survey of Americans shows a majority fear that cyber warfare is imminent and that the country will attack or be attacked in the next decade. Despite the threat, …
Uyghur Mac users targeted with spear-phishing emails
Uyghur activists are, once again, targeted with spear-phishing emails whose goal is to set up a backdoor on the victims’ computers. The Uyghurs are a Turkic ethnic …
Tax-themed malicious spam bombard inboxes
As the end of the U.S. tax season slowly approaches, cyber crooks are stepping up their game and are sending bogus out tax-themed emails. Webroot warns about an alert …
iOS flaw used to bypass iPhone’s lockscreen
The passcode lock in iPhones running iOS 6.x can be bypassed and anyone can access the photos, address book, make phone calls and send messages and emails from it, and more, …
Mobile network infections increase by 67%
Kindsight released a new report that reveals security threats to home and mobile networks, including a small decline in home network infections and an increase in mobile …
Successful ways of undermining cybercrime ecosystems
Most cybercrime is carried out by a loose confederation of independent contractors who work together when necessary through online forums and “partnerkas” that …
Video: Pirate Party MEP talks online child safety
Children and teenagers benefit hugely from being online, but they can also be targets of crime and exploitation as in any other environment. Child safety online is listed as …
Symantec unveils new SSL algorithms and web security products
Symantec unveiled new updates to its Website Security Solutions portfolio with capabilities to meet the increasing security and performance needs for connected businesses. The …
Reactions to Obama’s Executive Order on cybersecurity
On February 12, we have witnessed U.S. President Barack Obama sign an Executive Order and issue a Presidential Policy Directive aimed at improving the cybersecurity of …
LA Times website redirected users to exploit kit for over six weeks
A sub-domain of Los Angeles Times’ website has been redirecting visitors to compromised websites hosting the latest version of the Blackhole exploit kit for over six …
Adobe offers mitigation for Reader 0-day attack, fix is yet to come
Adobe has confirmed FireEye researchers’ findings about new Adobe Reader and Acrobat zero-day vulnerabilities being exploited in the wild and has issued a security …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform