Researchers break RSA SecurID 800 token in 13 minutes
An international team of scientists that goes by the name of “Team Prosecco” claims to have devised attacks that manage to extract the secret cryptographic key …
Ransomware appropriates security company logo
Ransomware is still targeting users all over Europe and, as per usual, it shows warnings seemingly coming from police agencies of the country in which the victim resides …
Microsoft survey exposes online bullying threat
More than half (54 percent) of children around the world worry about being bullied online, according to a new global survey released today by Microsoft. Conducted in 25 …
OS X Mountain Lion will include automatic security updating
Apple’s OS X Mountain Lion (version 10.8) is due to be released next month, and its latest Developer Preview shows a new addition meant to keep its users secure: the …
Splunk App for Active Directory released
Splunk announced the Splunk App for Active Directory which helps enable organizations to avoid service outages and provides proactive management and compliance reporting of …
US federal commission breach endangers employees
Employees of the US Commodity Futures Trading Commission – an independent agency of the United States government that regulates futures and option markets – have …
Bitdefender unveils new generation of products
Bitdefender launched Bitdefender 2013, improving and adding a whole arsenal of features to keep users safe. Bitdefender Safepay brings online banking and shopping to a whole …
Zeus malware strain infecting 1 in 50 PCs
ThreatMetrix Labs came across a new variant of the P2P version of the Zeus Trojan. One of the main changes to this variant is the way it encrypts its configuration file …
DroidSheep: Android tool for session hijacking
DroidSheep is a simple Android tool for web session hijacking (sidejacking). It listens for HTTP packets sent via a wireless (802.11) network connection and extracts the …
MI5 describes astonishing level of cyber attacks
MI5 has admitted that it is working to counter astonishing levels of cyber-attacks on UK industry. Head of MI5, Jonathan Evans, commented that vulnerabilities on the internet …
Video: Attacking XML preprocessing
Documenting more than a year of research in XML technologies, this talk by Nicolas Grégoire at Hack in The Box 2012 Amsterdam details security implications of the XML format …
Network Forensics: Tracking Hackers Through Cyberspace
Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous