Nearly half a million Yahoo passwords leaked following hack
Some 450,000 email addresses and associated unencrypted passwords have been dumped online by the hacking collective “D33Ds Company” following the compromise of a …
GFI Software launches cloud security and networking platform
GFI Software announced GFI Cloud, a platform for the delivery of cloud services via a Web-based user interface, accessible from anywhere with an Internet connection. …
Top skills for IT asset management leaders
The evolving and growing role of IT asset management (ITAM) is driving both increased demand for existing skills and a new requirement for augmented financial, commercial and …
Major pitfalls involving vulnerability scanners
While 92 percent of companies have a vulnerability management program in place, nearly half consider their networks to range from “somewhat” to …
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly …
Microsoft revokes 28 of its code-signing certificates
The long awaited patch for the CVE-2012-1889 vulnerability that has been heavily exploited in the wild and the exploit for which has even been included in the Blackhole …
Formspring breach and leak triggers massive password reset
Formspring, a social Q&A website popular with teenagers, is the latest site to have its servers breached and the passwords of its users compromised by hackers. According …
Trojan found being offered on Google Play for weeks
Symantec researchers have recently discovered Android malware being offered on Google Play, posing as legitimate game apps “Super Mario Bros.” and “GTA 3 …
Bruce Schneier: Trust, security and society
Human societies run on trust. Every day, we all trust millions of people, organizations, and systems — and we do it so easily that we barely notice. But in any system of …
Targeted attacks focus on small businesses
36 percent of all targeted attacks (58 per day) during the last six months were directed at businesses with 250 or fewer employees, according to Symantec. During the first …
Anti-theft Wi-Fi tag for laptops and tablets
Ekahau launched its newest Wi-Fi tag, the L4 Laptop tag. The L4 tag is a small flat unit designed to be plugged into the ExpressCard slot. The tag works with the Ekahau RTLS …
Multi-platform backdoor served through compromised website
The compromised website of a Colombian transport company has been found serving a signed Java applet that detects whether the visitor is using a Windows, OS X or Linux machine …
Featured news
Resources
Don't miss
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)
- AI security governance converts disorder into deliberate innovation
- Open-source flow monitoring with SENSOR: Benefits and trade-offs