Unredacted US diplomatic cables inadvertently leaked
Daniel Domscheit-Berg’s rationale behind his destruction of some 3,500+ unpublished files was that he had done it because Julian Assange and WikiLeaks could not …
Facebook pays bug hunters $40,000 in three weeks
The recently introduced Facebook bug bounty program has proved to be a great success, says Joe Sullivan, the company’s chief security officer. “We know and have …
USB 3.0 flash drive with 2 TB of storage
Transcend and ITRI unveiled a small USB stick that can offer up to 2 TB of storage.
Rogue Google SSL certificate allowed MITM Gmail attacks
Recently discovered attempts of an SSL man-in-the-middle attack against Google users – spotted by a number of Iranian Internet users – have revealed that Dutch …
2011: Year of the hack
In a year that IT security experts have labeled the “Year of the Hack,” Bit9’s endpoint survey of 765 IT executives revealed that Advanced Persistent Threat …
Security risks with 10Gb/s networks
A new survey shows that senior networking, operations and security professionals in telecommunications, online services, retail, manufacturing and healthcare have serious …
SDK for universal 2D and 3D object recognition
Neurotechnology announced SentiSight 3.0, a Software Development Kit (SDK) for universal object recognition. The object recognition algorithms now enable an even broader range …
WebSurgery: Suite for security testing of web applications
WebSurgery is a suite of tools for security testing of web applications. It was designed for security auditors to help them with the web application planning and exploitation. …
Many parents unaware if cyberbullying is an issue
While 89 percent of parents said they talk to their children about proper Internet safety, 40 percent do not know if cyberbullying is an issue at their child’s school, …
vOperations Suite 4: Clarity for cloud operations
VKernel released vOperations Suite 4, designed to provide operational clarity for cloud operators and enterprise data centers. This release introduces full Hyper-V …
Google servers as a DDoS tool
Google’s servers can be used by cyber attackers to launch DDoS attacks, claims R00T_ATI, a penetration tester for Italian security consulting firm AIR Sicurezza. He …
Hurricane Irene scams hit Facebook
As predicted, Hurricane Irene-themed scams have begun spreading on Facebook. The one spotted by Trend Micro fraud analyst Karla Agregado lures users in by offering a chilling …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware