The Information Diet
The modern human animal spends upwards of 11 hours out of every 24 in a state of constant consumption. Not eating, but gorging on information ceaselessly spewed from the …
Koobface botnet goes down, suspects scurry to erase tracks
As the names of the five individuals believed to be behind the Koobface botnet were revealed on Tuesday, their reaction was almost immediate and seems to validate the …
SharePoint users develop insecure habits
Microsoft SharePoint users are aware of the risks that exposing sensitive data can cause to their organization, yet unbelievably they are using the collaboration tool as an …
Free Facebook Mug scam doing rounds
A few months ago it was a free Facebook t-shirt to celebrate the social network’s 7th birthday, now it’s a free Facebook-themed ceramic mug, but the scam behind …
Twitter users targets of social spear phishing
Thousands of businesses and consumers are putting themselves at risk each day by publicly revealing their email addresses on Twitter. Websense monitored Twitter in January and …
74% believe mobile devices increase security incidents
The number of personal mobile devices connecting to corporate networks has more than doubled in the past two years, according to Check Point. 74% of UK businesses (compared …
New Wi-Fi tool from D-Link and Fluke Networks
D-Link has chosen Fluke Networks’ wireless planning technology to power its new Wi-Fi planning solution, the D-Link Wi-Fi Planner. D-Link Wi-Fi Planner is a wireless …
Alcatel-Lucent and Arbor Networks team up against DDoS attacks
Alcatel-Lucent and Arbor Networks joined forces to tackle the growing threat of DDoS attacks. Such attacks can compromise the communication networks used to provide a growing …
Secure field area networks for industrial applications
Tropos Networks announced the Tropos 1410 wireless mesh router and wireless bridge for field automation applications. Tropos 1410 wireless mesh routers and wireless bridges …
CompTIA Storage+ validates the skills of IT storage pros
A new exam and certification for IT professionals working in the evolving and expanding data storage arena was introduced today by CompTIA and the Storage Networking Industry …
Symantec admits its networks were hacked and source code stolen
After having first claimed that the source code leaked by Indian hacking group Dharmaraja was not stolen through a breach of its networks, but possibly by compromising the …
Oracle patches 78 vulnerabilities
Oracle publishes Critical Patch Updates (CPUs) on a quarterly schedule. Oracle released its January edition with patches for a majority of their product line: Oracle Solaris: …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!