Risk Control 6.0 released
Skybox Security announced Risk Control 6.0, featuring enhancements that help understand cyber security situations and act quickly to minimize risks that can lead to …
SpyEye Trojan post transaction fraud schemes attack banks
Many of us tend to spend a little more than we intend during the holiday season and, with all the transactions hitting our accounts, it can be hard to keep track. During the …
Spyware pushed via Google ads
Not every ad you are served by Google is good for you, warns Zscaler’s Julien Sobrier, as he spotted a suspicious looking ad for a free Flash Video player in his Google …
Israeli credit card hack creates more opportunities
In a recent data breach incident, a Saudi hacker defaced a prominent sports news web site in Israel and linked its front page to a file exposing the details of many credit …
Teach Yourself TCP/IP in 24 Hours
In just 24 sessions of one hour or less, you’ll discover how to implement, monitor, and manage a TCP/IP network – even the latest cloud-based and IPv6 networks. …
HID Global acquires EasyLobby
HID Global has acquired EasyLobby, a provider of visitor management solutions. The company’s product suite provides visitor registration, tracking, reporting, badge …
New Facebook clickjacking scam spreads like fire
A new and extremely viral clickjacking scam has been spotted targeting curious Facebook users. It hooks them with links to titillating, disgusting or “amazing” …
Defensive search-and-destroy “virus” delivered to Japanese government
It took three years and 178.5 million yen (around $2.3 m) to develop a defensive cyber weapon that can track down the sources of cyber attacks and disable them, but Fujitsu …
AntiSec hackers hit California State Law Enforcement Association
When Operation AntiSec was started by Anonymous and LulzSec back in June and the two groups called on “any vessel, large or small, to open fire on any government or …
Nmap introduces 51 new scripts
Nmap is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network …
Tips to manage top IT trends
ISACA shared recommendations today for managing three of the trends widely cited to dominate the IT landscape in 2012: Big Data, the consumerisation of information technology …
Single packet authorization and port knocking
fwknop implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a default-drop packet filter (fwknop supports …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services