Police raids controversial Swedish web host, Pirate Bay site is down
The Pirate Bay’s website is unreachable and has been down for over a day now, prompting speculation that Monday’s police raid of the premises of Stockholm-based …
One in three companies take compliance risks
Despite having corporate security and compliance policies and solutions in place, there is a widespread lack of confidence in their effectiveness. According to a DataMation …
Twitter account hijacking exposes easy-to-exploit security flaw
The hijacking of the Twitter account that belongs to user Daniel Dennis Jones and his subsequent investigation into the matter has revealed a Twitter security weakness that …
Bogus AT&T notification leads to phishing
Another month, another bogus AT&T notification, warning recipients to verify their email accounts or they will have them suspended: But where previous fake emails …
Fake Apple Store discount card leads to identity theft
Bogus discount card offers purportedly coming from Apple and offering to recipients to buy a AU$100 worth in store credit for the small sum of AU$9 have recently been …
Free calculator: Duration of ISO 27001/ISO 22301 implementation
IS&BCA released a free calculator that will help you estimate the time needed for your ISO 27001 or ISO 22301 implementation. Since these two standards are equally …
DDoS attacks reach new level of sophistication
Prolexic Technologies warned of an escalating threat from unusually large and highly sophisticated DDoS attacks. The DDoS attacks have been launched in the last week using the …
Free USSD exploit blocker app
Avira released a free security app for Android phone users to protect them from remote USSD attacks. The Avira USSD Exploit Blocker app is available on Google Play. …
Contrast security plugin invisibly monitors applications during testing
Aspect Security announced Contrast, an application security service that creates a real-time dashboard of intelligence and vulnerabilities. Contrast is an IAST solution, …
Tool prevents hackers from obtaining Android app source code
RIIS announced HoseDex2Jar, a mobile security tool that can prevent Android decompilation by hackers on mobile devices. Android runs applications in .dex format. Dex2Jar is …
New wireless APs and 2-factor authentication products from Fortinet
Fortinet announced four new wireless access points along with three new two-factor authentication products. Fortinet is introducing four new additions to its wireless access …
Pen-testing Cookie Cadger continues where Firesheep left off
When the Firesheep extension was revealed to the world in late 2010, its developer said that his main goal was to get sites to switch to full end-to-end encryption, i.e. SSL. …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)