SpyEye Trojan post transaction fraud schemes attack banks
Many of us tend to spend a little more than we intend during the holiday season and, with all the transactions hitting our accounts, it can be hard to keep track. During the …
Spyware pushed via Google ads
Not every ad you are served by Google is good for you, warns Zscaler’s Julien Sobrier, as he spotted a suspicious looking ad for a free Flash Video player in his Google …
Israeli credit card hack creates more opportunities
In a recent data breach incident, a Saudi hacker defaced a prominent sports news web site in Israel and linked its front page to a file exposing the details of many credit …
Teach Yourself TCP/IP in 24 Hours
In just 24 sessions of one hour or less, you’ll discover how to implement, monitor, and manage a TCP/IP network – even the latest cloud-based and IPv6 networks. …
HID Global acquires EasyLobby
HID Global has acquired EasyLobby, a provider of visitor management solutions. The company’s product suite provides visitor registration, tracking, reporting, badge …
New Facebook clickjacking scam spreads like fire
A new and extremely viral clickjacking scam has been spotted targeting curious Facebook users. It hooks them with links to titillating, disgusting or “amazing” …
Defensive search-and-destroy “virus” delivered to Japanese government
It took three years and 178.5 million yen (around $2.3 m) to develop a defensive cyber weapon that can track down the sources of cyber attacks and disable them, but Fujitsu …
AntiSec hackers hit California State Law Enforcement Association
When Operation AntiSec was started by Anonymous and LulzSec back in June and the two groups called on “any vessel, large or small, to open fire on any government or …
Nmap introduces 51 new scripts
Nmap is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network …
Tips to manage top IT trends
ISACA shared recommendations today for managing three of the trends widely cited to dominate the IT landscape in 2012: Big Data, the consumerisation of information technology …
Single packet authorization and port knocking
fwknop implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a default-drop packet filter (fwknop supports …
Hackers aim to fight Internet censorship with own communication satellites
Communication satellites are usually put into orbit by governmental agencies or big corporations, but a group of hackers is planning to do some satellite-launching of their …
Featured news
Resources
Don't miss
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC