Red Hat introduces open hybrid cloud solutions
Red Hat announced a set of solutions that the company plans to roll out in the coming months that are based on Red Hat products and technologies and are designed to enable …
Hack This: 24 Incredible Hackerspace Projects from the DIY Movement
Hack This is your passport to the world of hackerspaces: your invitation to share knowledge, master tools, work together and build amazing stuff. Twin Cities Maker co-founder …
Massive crime ring automates bank fraud, steals tens of millions
Two-factor authentication schemes have definitely been proven to be ineffectual as news of a massive global financial services fraud campaign that targeted well-moneyed …
Fake “confirm PayPal account” emails lead to phishing
An extremely legitimate looking email supposedly coming from PayPal has been hitting inboxes in the last few days, trying to trick customers of the popular e-payment giant to …
FBI arrests 24 carders in online sting, UGNazi leader is among them
Following a two-year undercover operation led by the FBI, a coordinated action involving law enforcement agencies from 13 countries has led to the arrest of 24 individuals …
“Wire transfer confirmation” emails deliver malware
“Wire transfer confirmation” spam emails are nothing new – they’ve been regularly turning up in users’ inboxes throughout the years. But, as much …
Cisco announces Linksys Smart Wi-Fi Router EA6500 with 802.11ac
Cisco announced its first Linksys Smart Wi-Fi Router and Universal Media Connector both powered by 802.11ac. The new technology is designed to deliver wireless speeds …
Customized webinjects for Zeus and SpyEye Trojans on sale
Criminals are now selling customized webinjects that are priced per feature. For example, one seller offers a webinject for Zeus/SpyEye that contains the automatic transfer …
Virtualization critical for disaster recovery
A BUMI survey, which polled CEOs, business owners and IT professionals at small- to mid-sized firms, found that 98 percent of respondents felt that more than one day to …
FIPS-validated mobile VPN for iPhone and iPad
Columbitech announced the availability of the enterprise-grade mVPN Secure Browser 5.0, which supports the iPhone, iPad and iPod Touch. The browser provides secure access to …
Windows 8 marks the beginning of the WinRT era
Windows 8 marks the beginning of the new WinRT (Windows Runtime) computing era and the beginning of the end of the WinNT era, according to Gartner. The combination of the …
Researchers break RSA SecurID 800 token in 13 minutes
An international team of scientists that goes by the name of “Team Prosecco” claims to have devised attacks that manage to extract the secret cryptographic key …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military