Facebook hacker released on bail
The extent of the attacks mounted by 25-year-old British student Glenn Steven Mangham against Facebook’s servers has been revealed as the Westminster magistrates’ …
Chinese mobile phone monitoring service found
What do you think cyber crooks do with the information collected from mobile phones by malware? Trend Micro has one of the answers to that question. Its researchers have …
Google+ introduces verified accounts
Google is adding another feature that should guarantee that a Google+ profile corresponds with the actual real-life identity of a user. “We’re starting to roll out …
Week in review: First flaws detected in the AES, Android malware and Internet bad neighborhoods
Here’s an overview of some of last week’s most interesting news and articles: Third-party Firefox add-ons to be blocked automatically Mozilla has decided to put a …
Facebook releases official Security Guide
Tired of having to explain to friends and family about the dangers lurking on Facebook? The social network has released an official Guide to Facebook Security, so share the …
Strategies for effective data analytics
Organizations with effective data analytics can make stronger business decisions by learning what is working and what is not, what they are doing well, and where they need …
Trojanized Android app intercepts messages to hide costly subscriptions
Another trojanized Android app that monitors received text messages for keywords has been uncovered by Trend Micro, and this time, the feature is not used for spying but to …
“Free ‘Breaking Dawn Part 2’ tickets” Facebook scam
The penultimate movie in The Twilight Saga has not yet arrived to cinemas, but cyber scammers have decided on an even bigger attraction to lure Internet users into sharing …
Emerging threats: Attacks via MIPS devices
First of all, if something has already been invented and has been seen in-the-wild more than once, it’s very likely to occur again and again, especially if the attacks …
Confidence in online retailers sinks
According to a study of consumer sentiment toward online shopping and security by McAfee, only about a third of online consumers believe that most websites are safe for …
Coding for Penetration Testers
Tools used for penetration testing are often purchased off-the-shelf. Each tool is based on a programming language like Perl, JavaScript, Python, etc. If a penetration tester …
Keeping abreast of Web malware delivery techniques
One of the crucial things that Google must do to keep making Internet users use its search engine is to keep an eye on the many ways that cyber criminals employ to spread …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware