Top words cybercriminals use in fake emails
The top words cybercriminals use create a sense of urgency, to trick unsuspecting recipients into downloading malicious files. The top word category used to evade traditional …
Ethics of Big Data
What are your organization’s policies for generating and using huge datasets full of personal information? Ethics of Big Data examines ethical questions raised by the …
How to recognize rogue online pharmacies
As the prices of pharmaceuticals keep rising, so does the popularity of online pharmacies. Crooks noticed the high earning potential of rogue online pharmacies from the very …
Backdoor Trojan masquerading as KLM e-ticket
As many flyers tend to book their tickets online and receive them in electronic form, it’s no wonder that malware peddlers often choose to deliver their malicious wares …
Stolen card data on sale on professional-looking e-shop
The theft of debit and credit card information has become a lucrative business, but sometimes the individuals that engage in the stealing are not so eager to user the …
Facebook turns off facial recognition in Europe
Facebook has assented to keeping the facial recognition feature (“Tag Suggest”) for its European users off until European regulators allow it to be reinstated, and …
Big Data grows as data security shrinks
A report published by PricewaterhouseCoopers (PwC) has revealed that despite the growing issue of “Big Data,” most organisations are actually keeping looser tabs …
Decoding digital danger: The ever-moving threat
It was announced recently that GCHQ, the Government’s electronic intelligence unit, is to advise Britain’s senior business leaders on how to oppose the mounting …
Gartner says Windows 8 is a big gamble
Microsoft is taking a big gamble over the next few months with Windows and Office, the two products responsible for most of its revenue and profit, according to Gartner. It is …
Learning Unix for OS X Mountain Lion
Beneath OS X easy-to-use GUI interface lies a powerful Unix engine. Mac users have Unix, as well as a host of tools ported over from Linux, at their fingertips; the just need …
Week in review: IE zero-day patched, Flame C&Cs reveal more malware, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: Google adds Do Not Track support to Chrome The next official release of …
Microsoft patches IE zero-day and Flash flaws in IE 10
Microsoft has delivered on its promise and has issued a security update for Internet Explorer to address the zero-day memory-corruption vulnerability in versions 9 and earlier …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware