Hacked Sky News Twitter account falsely reports on Murdoch arrest
Hacking Twitter feeds of popular mainstream media outlets is a perfect way of getting your message across to or create panic among a great number of people. It has also lately …
IBM unveils mobile security service
IBM unveiled its Hosted Mobile Device Security Management service that helps organizations protect against data loss and other risks caused by device theft, unauthorized …
Week in review: Cell phone money laundering, hardware Trojans and iOS flaw that allows downloading of malicious code
Here’s an overview of some of last week’s most interesting news and articles: Browser bloat and privacy concerns An increase in browser-based bloat and malware, …
Steam server attackers grabbed passwords, credit card data
As Bethesda Software was preparing to release Skyrim, the latest installment of its mega popular Elder Scrolls series, news that the forum of Steam, the online …
100% of enterprises reported cyber attacks
Attacks are becoming more difficult to defend against and are expensive to mitigate, with traditional safeguards falling short, according to F5 Networks. With both …
Scammers sending out bogus job offers
Cyber scammers do not hesitate using every scrap of information there is on the Internet in order to gain users’ trust and misuse it for their malicious purposes. Also, …
Block cipher encryption effectively hides banking Trojan
Brazilian malware peddlers have turned to encrypting banking Trojans with block ciphers, effectively bypassing most AV software. Kaspersky Lab’s Dmitry Bestuzhev says …
Entry VPN client for Windows
NCP engineering announced Secure Entry Client 9.3, its entry VPN client for Windows which supports mobile broadband in Windows 7 and Internet Key Exchange version 2 (IKEv2). …
Integrate security and risk management: TOGAF and SABSA
There is a new free guide that enables enterprise and security architects to integrate security and risk management approaches into enterprise-level architectures. Endorsed …
How does cell phone money laundering work?
In Russia, most cell phone SIM cards are prepaid. One of the major Russian operators offers a legal service that allows anyone to transfer the prepaid amount of money from a …
New techniques for detecting hardware Trojans
Most Internet users know about the existence of software Trojans, but that of hardware ones is less known. They consist of integrated circuits that have been modified by …
Cybercriminals exploiting user inexperience
Noteworthy threats in October 2011 included the return of a rogue web browser, a phony hacking tool for Gmail account password recovery and malware disguised as advertisements …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!