Fake game apps flood Google Play
Android users are once again in danger of getting their information collected and being hit by an unending stream of spam and unwelcome offers just because they searched for …
PowerDNS 3.2 expands DNSSEC support
The PowerDNS Authoritative Server enables authoritative DNS service from all major databases, including but not limited to: MySQL PostgreSQL Oracle SQLite LDAP DB2 Sybase …
Newest Java update doesn’t fix fresh critical vulnerabilities
Another week, another zero-day threatening millions of Java users. As you might remember, last week Oracle released Java 7 Update 11, which patched the zero-day vulnerability …
Polish CERT hits Virut botnet
The Polish Research and Academic Computer Network (NASK), the national registry of the .pl domain and founder of CERT Polska, has announced on Friday that they took over 23 …
The sharp rise of UK e-crime
News that e-crime accounts for 37% of all retail crime, reflects the changing nature of the threats that today’s retailers are facing. As brands struggle to compete on …
Video: Hacking Huawei VRP
Huawei routers are no longer devices only seen in China. Entire countries run their Internet infrastructure exclusively on these products and established tier 1 ISPs make …
Cisco releases three 802.11ac powered Smart Wi-Fi Routers
Cisco Linksys announced the expansion of its Linksys Smart Wi-Fi portfolio with three 802.11ac powered Smart Wi-Fi Routers, a new compact 802.11ac USB adapter, new features …
Designing and Implementing a Server Infrastructure
Prepare for Exam 70-413 and help demonstrate your real-world mastery of enterprise server design and implementation. Designed for experienced, MCSA-certified professionals …
Week in review: Remote Linksys 0-day root exploit discovered, the Pobelka botnet, and a year of Microsoft patches
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Looking back at a year of Microsoft patches Last year …
New RAT family makes its traffic look legitimate
RATs – Remote Access Trojans – are often used by cyber attackers to maintain a foothold in the infected computers and make them do things unbeknownst to their …
Security vulnerabilities in ESPN ScoreCenter mobile app
ESPN ScoreCenter, one of the most popular mobile sports apps on the market, has significant security vulnerabilities that could compromise users’ mobile devices, …
Why Facebook Graph Search will help cybercriminals
While Facebook’s newly announced graph search capability is awesome for people who like social networking, it also provides criminals with another source of information …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online