Google Go programming language used for creating destructive Trojan
When Google introduced its Go programming language in 2009, they surely didn’t hope for it to be used for writing malware but, as these things go, it was a only a matter …
Cyber criminals actively targeting financial institutions, warns FBI
Cyber criminals have been and are actively targeting employees of financial institutions with spam and phishing e-mails, warns the FBI-backed Internet Crime Complaint Center …
Microsoft promises fast fix for IE zero-day as new attacks are discovered
The problem of the remotely-exploitable IE zero-day memory-corruption vulnerability that is being misused in current attacks has reached a critical enough level for Microsoft …
(IN)SECURE Magazine issue 35 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 35 has been released today. Table of contents: …
Bogus “Windows Email Security Update” emails lead to phishing
Hot on the heels of the malicious spam emails posing as Microsoft notifications about changes to Microsoft Services Agreement comes a Microsoft-themed phishing attempt. …
Phishers continue to target legitimate websites
Attackers confidently exploit legitimate websites with the same methods and that they succeed because victims are not implementing recommended best practices, countermeasures …
Real-world software security initiatives study
Cigital announced the fourth major release of the Building Security In Maturity Model (BSIMM) study. This release describes real-world data from fifty-one firms with active …
One third of European organizations refuse to implement BYOD
Imation released research which shows that German workers are most likely to follow rules around secure remote working, with 50% of German respondents saying that they always …
Data migrations: Potential security hole
While 95% of organisations move data at least once per year, 65% of those surveyed admitted that they were not confident sensitive data was protected during a migrationm, …
Cloud services market to surpass $109 billion in 2012
The public cloud services market is forecast to grow 19.6 percent in 2012 to total $109 billion worldwide, according to Gartner. Business process services (also known as …
Secure audio and microphone switch from Belkin
Belkin released its Secure Audio and Microphone Four-Port Switch which offers users centralized control over audio ports, and is designed to reduce the possibility of analog …
Two men plead guilty to hacking hundreds of Subway POS computers
Two Romanian nationals pleaded guilty today to participating in an international, multimillion-dollar scheme to remotely hack into and steal payment card data from hundreds of …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)