Please turn on your JavaScript for this page to function normally.
A new class of CISO is coming

A new IBM study reveals a clear evolution in information security organizations and their leaders with 25 percent of security chiefs surveyed shifting from a technology focus …

1,000+ WordPress sites compromised through automatic update feature

More than 1,000 WordPress blogs have been modified to redirect visitors to sites serving malware, affiliate and pay-per-click redirectors, and low quality PPC search result …

Microsoft names source of RDP code leak

Microsoft confirmed that, as speculated months ago, the RDP PoC exploit was sourced from China. It was apparent that the exploit originated in the West as researchers noticed …

New hacking group hits government websites, leaks stolen data

A hacker group that named itself “The Unknowns” has recently boasted on Pastebin of having compromised a number of government, business and educational websites, …

Top 10 business logic attack vectors

Application business logic flaws are unique to each custom application, potentially very damaging, and difficult to test. Attackers exploit business logic by using deductive …

Comprehensive email threat protection from GFI Software

In order to help SMBs in the fight against email-borne threats, GFI Software today announced the availability of GFI MailEssentials 2012 UnifiedProtection. The solution …

NetIQ minimizes the risk of unauthorized access

Organizations struggle with managing and reporting on end user access and entitlements to meet monthly or quarterly reporting audit cycles and protect corporate information. …

The difficulties in sizing up botnets

The main metric with which security researchers identify how effective and disruptive specific botnets are is the number of computers they consists of. Estimating their size …

RedKit exploit kit spotted in the wild

A new exploit kit that Trustwave researchers have spotted being used in the wild is aiming to enter a market that is practically monopolized by the widely famous BlackHole and …

“Free additional storage” phishing emails doing rounds

Symantec researchers warn about a variety of fake emails supposedly coming from popular email and online storage services, offering “storage quota upgrades”. A …

Android drive-by download malware served by hacked websites

A number of legitimate but compromised websites have been spotted serving Android malware to unsuspecting visitors, warns Lookout. The downloading of the malware, which poses …

Location-based apps thrive despite privacy concerns

Fifty-eight percent of consumers who have a smart device use location-based applications, despite concerns about safety and third-party use of their personal information for …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools