Windows 8 users open to Flash exploits
Users who have downloaded and are using the “Release To Manufacturing” version of Windows 8 or the 90-day trial version of Windows 8 Enterprise should be aware …
11,000 Guild Wars 2 accounts hacked in ongoing attacks
The second sequel of the popular Guild Wars multiplayer online RPG by ArenaNet has been released less than two weeks ago, and player accounts are already being heavily …
New program offers pathway into cyber security field
(ISC)2 launched the (ISC)2 Young Professionals, a new group designed to help cultivate the information security workforce of the future. The pilot stage of the program will …
Who is the most dangerous cyber celebrity?
Emma Watson has replaced Heidi Klum as McAfee’s 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular …
Apache HTTP Server set to ignore IE10’s Do Not Track request
Microsoft’s decision to make Internet Explorer 10 in Windows 8 have the “Do Not Track” (DNT) option turned on by default has stirred a heated discussion …
Mobile malware has become a profitable industry
Lookout released its State of Mobile Security Report 2012 which explains the issues that individuals faced on mobile devices this year and explores the prominent trends in …
Data breaches expose 94 million records in the government sector
An analysis of government breach data shows that the government sector reported 268 incidents of data breaches from January 1, 2009 to May 31, 2012, which exposed more than 94 …
87% have something to hide on their smartphones
When it comes to the almost weekly reports of celebrity phone hackings and leaks, more than half of consumers believe these are merely stunts to garner publicity. In the end, …
AlgoSec enhances firewall policy management suite
AlgoSec announced version 6.3 of its Security Management Suite, which simplifies the operational and security challenges of managing firewall policies. The suite pffers …
Microsoft Private Cloud Computing
Written by a team of expert authors who are MVPs and leaders in their respective fields, Microsoft Private Cloud Computing is an essential resource for IT administrators who …
Week in review: 1m Apple IDs leaked, and Google hackers behind zero-day attacks
Here’s an overview of some of last week’s most interesting news, reviews and articles: The top Internet dangers for kids Data received from Kaspersky Security …
BEAST developers come up with new SSL/TLS attack
From the security researchers who created and demonstrated the BEAST (Browser Exploit Against SSL/TLS) tool for breaking SSL/TLS encryption comes another attack that exploits …
Featured news
Resources
Don't miss
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info