Life cycle and detection of an exploit kit
As the process of owning systems and dragging them into botnets becomes ever more commercialized, exploit kits have emerged as a favorite of attackers. Their point-click-own …
Information Overload
Written and edited by an international group of experts from academia and industry, Information Overload clearly links academic theory to real-world practice, providing a …
Week in review: Facebook investigates data leak, removes insecure feature, and Windows 8 exploit on sale
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Privacy compliance laws: Why the European Commission finally got it right …
Team GhostShell leaks 2.5M records from Russian govt, firms
Team GhostShell, the hacker group responsible for the recent leak of some 120,000+ records raided from top universities around the world, has done it again. “GhostShell …
Facebook flaw allowed access to accounts without authentication
A commenter on the Hacker News website has discovered by accident a pretty big security flaw that could allow anyone who knew what to search for to access over a million …
Free game offer leads to Steam phishing site
Online gamers are often targeted with phishing schemes set up by crooks who are after users’ in-game items and money, and the latest one to be spotted is aimed at Steam …
25% of Google Play apps pose a security risk
New research shows that more than 100,000 Android applications in the Google Play store (25 percent) pose a security risk to mobile device users and the enterprise networks to …
Windows 8 exploit combining several 0-days already up for sale
Less that a week after Microsoft released is long awaited Windows 8, with new and improved security features, French bug hunters VUPEN Security have announced that they have …
Early Windows 8 reactions and plans
PC Helps completed a Windows 8 survey designed to gauge reactions and plans to migrate to Windows 8. More than 500 IT leaders and managers from US-based companies with 500 …
Companies don’t understand cloud services
A majority of SMBs in the UK and US are unsure of cloud services or think they are only for large companies, thus missing out on the opportunity to increase productivity and …
Apple increases security with iOS 6.0.1
Apple released iOS 6.0.1 for iPad, iPhone and iPod touch, which can be downloaded and installed using iTunes. Kernel An information disclosure issue existed in the handling of …
Secure nationwide managed services network
Harris Corporation introduced a new managed services solution that will enable customers to move massive amounts of data securely over a nationwide, high-capacity terrestrial …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware