Georgia shows photos of Russian-based hacker spy
A Russian-based hacker has been unmasked as one of the attackers behind a long-standing campaign aimed at compromising computers belonging to Georgian ministries, parliament, …
Can the Nuclear exploit kit dethrone Blackhole?
In a market dominated by the mega-popular Blackhole exploit kit (newly upgraded to version 2.0) and the somewhat less sought-after Eleonore and Phoenix exploit packs, can the …
Bank of America customers under phishing attack
Bank of America customers, beware – the old “account suspended” warning purportedly sent by your bank’s Cardmember Services is hitting inboxes once …
Gang steals over $1M by exploiting Citigroup e-payment flaw
Fourteen individuals were charged following a FBI-led investigation into the theft of over $1 million from Citibank using cash advance kiosks at casinos located in Southern …
Application Security updates its database scanning tool
Application Security announced the latest release of its database scanning tool, AppDetectivePro. Expanded capabilities and a new user interface provide security, risk and IT …
Secunia Vulnerability Intelligence Manager 4.0 released
The Secunia VIM 4.0 covers more than 40,000 software systems and applications. Its provides intelligence about software vulnerabilities available to organizations, ensuring …
Microsoft’s worldwide threat assessment
In this podcast recorded at RSA Conference Europe 2012, Tim Rains, the Director of Product Management at Microsoft’s TWC group, talks about volume 13 of …
EMC to acquire Silver Tail Systems
EMC has signed a definitive agreement to acquire Silver Tail Systems, a provider of real-time web session intelligence and behavioral analysis. Terms of the deal were not …
Interactive CERT map from ENISA
ENISA has published a new interactive CERT map and Inventory of CERT’s activities in Europe containing publicly listed teams and co-operation, support and …
Trojan Horse: A Novel
It’s two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida’s assault on the computer …
Facebook investigates data leak from 1 million accounts
Facebook will be launching an internal investigation following the revelation by Czech blogger Bogomil Shopov that data belonging to over one million Facebook users was …
Israel Police pulled computers offline due to RAT infestation
Trend Micro researchers have managed to get their hands on the malware that caused the Israeli Police Department to pull all of its systems offline last Thursday, and the …
Featured news
Resources
Don't miss
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers
- U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam
- A safer way to break industrial systems (on purpose)