New Android Trojan secretly buys apps
Even though malicious Android apps can occasionally be found on Google Play, Chinese third-party online Android markets are known for offering them by the hundreds, if not …
Open source IDS Suricata 1.3 released
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. Several characteristics of …
Fake anti-piracy warnings hitting UK users with money requests
Much has been said and written about the UK’s Digital Economy Act, but most Internet users still know just one thing about it: that it will eventually end with ISPs …
Worldwide IT spending to surpass $3.6 trillion in 2012
Worldwide IT spending is on pace to reach $3.6 trillion in 2012, a 3 percent increase from 2011 spending of $3.5 trillion, according to the latest outlook by Gartner. …
Cuckoo Sandbox: Automated malware analysis
Cuckoo Sandbox is an open source automated malware analysis system. It started as a Google Summer of Code 2010 project with The Honeynet Project and evolved into being one of …
Think Like a Programmer
The real challenge of programming isn’t learning a language’s syntax—it’s learning to creatively solve problems so you can build something great. In this …
Week in review: Android clickjacking rootkit, EU Parliament rejects ACTA, and Facebook’s contact-deleting API bug
Here’s an overview of some of last week’s most interesting news, videos and articles: Firewall management, IPv6 and you While the IPv6 protocol has been around for …
Fake Amex warning leads to exploit kit
A fake American Express email trying to lure users into following a malicious link by making them think that someone has reset their password for their online account has …
New ransomware threatens with police report
A new strain of ransomware demands 3000 Euros for not sending a report to the police about the users’ alleged predilection for child pornography. The malware in question …
“Dalai Lama’s birthday plan” email leads to backdoor
Today marks the current Dalai Lama’s 77th birthday – an occasion that served as a perfect ploy to make his supporters unknowingly install a backdoor on their …
Spam campaigns using popular companies on the rise
In June, GFI threat researchers observed two fresh spam campaigns linking to Blackhole exploits which posed as confirmation emails from Twitter and Amazon. Delta Airlines …
Getting ahead of the security poverty line
Being stuck below the security poverty line isn’t about budget, it’s about attitude, motivation, and focusing not simply on basic compliance but rather on your …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)