Security firm publishes details about Java issue, asks for second opinion
Making good on their promise, Security Exploration has published technical details about a Java issue that they consider to be a security vulnerability, but Oracle has …
3,600 organized crime groups active in the EU
In the most detailed study ever undertaken of its kind in the European law enforcement community Europol has identified an estimated 3,600 organized crime groups currently …
Beware of fake Candy Crush apps on Google Play
Whenever a mobile game becomes hugely popular, it also becomes a great way for scammers and malware peddlers to lure users into unknowingly installing malicious apps on their …
The role of critical risks in internal audits
As companies have come to accept that market volatility, complexity, political and regulatory changes are here to stay, internal audit functions have more opportunities to …
Andrew Auernheimer gets prison sentence for AT&T iPad “hack”
Andrew “weev” Auernheimer, security researcher and member of Goatse Security, has been handed a 41-month-long prison sentence for harvesting and publishing emails …
Who is attacking industrial control systems?
Since the discovery of Stuxnet, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) networks have received a fair share of attention from …
Data breaches in higher education
TeamSHATTER reports on data breaches in the higher education vertical throughout the United States. The past year has seen a substantial uptick in the amount of total records …
Massive casino scam pulled off via CCTV system compromise
A high-rolling player has been thrown out of a casino in Australia after having successful executed a scam that involved compromising of the gambling establishment’s …
Splunk integrates with relational databases
Splunk announced Splunk DB Connect, which delivers scalable, real-time integration between Splunk Enterprise and traditional relational databases. With Splunk DB Connect, …
Becoming a malware analyst
There are few jobs in this industry that seem as appealing and interesting to me as that of a malware analyst. In my mind, these professionals were waking up each day to …
AVG CloudCare adds new email security services
AVG announced a new release of AVG CloudCare, the cloud based administration platform that allows remote deployment and management of IT and security services for SMBs. The …
“Confidential document on Google Docs” leads to account hijacking
A simple phishing scam aimed at harvesting users’ Google credentials is hitting inboxes around the world, warns Hoax-Slayer. “Please view the document i uploaded …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military