Common Vulnerability Reporting Framework updated
The Industry Consortium for Advancement of Security on the Internet (ICASI) announced Common Vulnerability Reporting Framework (CVRF), Version 1.1. Enhancements offer users a …
Flashback botmasters earned less than $15K
It has already been established that the criminals behind the Flashback botnet were after money, but according to Symantec researchers, their plan was foiled by the attention …
Anti-Anonymous hacker takes credit for The Pirate Bay DDoS
After 72 hours of being hit with an extensive DDoS attack and having been intermittently inaccessible to its visitors, The Pirate Bay and WikiLeaks are back online. It was …
Briton jailed for hacking a Facebook account
Gareth Crosskey, a 21-year-old from West Sussex who was arrested for hacking into a private Facebook account, has been handed down a prison sentence of 12 months by the …
Most CCTV systems are easily accessible to attackers
The use of CCTV cameras for physical surveillance of all kinds of environments has become so pervasive that most of us don’t give the devices a second thought anymore. …
How executives understand and manage IT risks
Corporate boards and executives are taking risk management seriously but there is still a gap in understanding the link between IT risks and enterprise risk management, …
A marathon of holiday spam
The main spam topics that emerged during the last quarter included the increase in spam during the holidays, mass mailings, malicious attachments and the distribution of …
Leveraging PCI standards to accept mobile payments securely
The PCI Security Standards Council (PCI SSC) published a customized fact sheet outlining how merchants can securely accept payments using mobile devices such as smartphones or …
Content-related threats cause significant data loss
Content-layer threats – those where an attacker leverages malicious software in what the user believes is harmless content – are posing increasing risks for …
Android security: Protection of Java and native apps
Arxan Technologies enhanced its Mobile Application Protection Suite to include multi-layered, end-to-end protection for Android applications. Given the open source nature of …
Cloud computing as key to improved data protection
More than half (55%) of U.S. organizations expect their use of the cloud to increase as part of their business continuity strategy over the next year, according to CA. …
Kickstarter bug granted access to unlaunched projects
A bug in the private application programming interface (API) of Kickstarter, the popular crowd funding website for creative projects, has exposed details about 70,000 projects …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)