Global malicious websites increase by 600%
Year-over-year, the number of malicious web-based attacks increased by nearly 600 percent, according to Websense Security Labs. These attacks were staged predominantly on …
People worry more about being phished at home than at work
In a corporate world where workers are bombarded with an average of 6 phishing emails everyday and 60% of people fall for them, research released by PhishMe has found that …
ATM skimming ring compromised over 6,000 bank accounts
U.S. federal authorities have announced the filing of an indictment against two alleged leaders of an international scheme to steal customer bank account information using …
Flickr bug made users’ private photos public
A glitch in the Flickr matrix has resulted in intimate photos of a number of its users being made available for everyone to see after their permissions turned from …
Zscaler delivers big visibility security analytics
Zscaler unveiled new analytics technology that gives enterprise security professionals real-time visibility into all employee internet activity across web, cloud email, and …
Samsung unveils new cloud displays
Samsung announced its next-generation TC191W and TC241W thin-client and NC191 and NC241 zero-client cloud displays. The lines combine VDI and desktop virtualization for secure …
McAfee delivers unified rapid-response security management
McAfee is raising the bar on intelligent threat identification, time to respond and robust, unified security management with the latest updates to its security management …
Opportunistic scanning from cloud to endpoint
iScan Online introduces opportunistic security scanning from the cloud to any device. They perform internal PAN, PCI and Vulnerability scanning without installing software or …
Microsoft releases 12 bulletins that address 57 vulnerabilities
The second Patch Tuesday of 2013 has a much higher volume than usual. There are 12 bulletins, five of which are critical, addressing a total of 57 vulnerabilities. But the …
Mega pays out first batch of bounties, its crypto still intact
Mega, the file hosting service and successor to Megaupload founded by Kim Dotcom, recently instituted a bug bounty program that should help keep the service and its users safe …
Highlights from 450 global data breach investigations
Trustwave released details form a report that highlights details and trends from 450 global data breach investigations, 2,500 penetration tests, nine million Web application …
Comment Group hackers specialize in high-profile targeted attacks
It is common knowledge that spear-phishing has become the preferred way for persistent attackers to gain a foothold in targeted systems and network. In fact, most of the …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform