BT commanded to block site linking to pirated content
The verdict is in: British Telecom must block users from accessing the Newzbin 2 website, an aggregator of links to pirated movies and other content. The ruling could provide …
Use Google’s indexing capabilities to identify vulnerabilities
Next week at Black Hat, Stach & Liu researchers Francis Brown and Rob Ragan will show how the power of Google’s indexing capabilities can be harnessed to identify …
What did the RSA breach end up costing EMC?
RSA, the security division of EMC Corporation, has suffered a breach of its networks and the loss of critical data back in March. An initial refusal of sharing details of the …
Half of organizations face downtime due to patching
53 per cent of companies are affected by downtime when it comes to deploying patches, according to Dell KACE. A further 29 per cent of companies had IT teams conduct patching …
LulzSec member Topiary arrested?
Was LulzSec member Topiary arrested yesterday by the e-Crime Unit of London’s Metropolitan Police? “The man arrested is believed to be linked to an ongoing …
AVG releases Premium Security
AVG announced Premium Security, the Internet security solution that surveys the Web for incidents of stolen identity. It includes AVG Identity Alert, AVG Internet Security and …
Phishers becoming sophisticated marketers of fraud
Phishers are becoming more sophisticated criminal marketers, according to a report by IID which documents a quarter that was a watershed for data breaches, from large-scale …
Managers don’t understand the power of IT
While the world is distracted with the continuing reports of phone hacking practices and other corporate data breaches, it is revealed that hundreds of organizations are now …
First OpenStack Infrastructure-as-a-Service cloud solution
Dell announced the Dell OpenStack Cloud Solution, which integrates the OpenStack cloud operating system, cloud-optimized Dell PowerEdge C servers, the Dell-developed …
Google still grabbing more than just Wi-Fi devices’ MAC address?
Google is in for another privacy dispute, as it seems that its Street View cars have not been collecting only hardware IDs of detected Wi-Fi devices, but also the MAC …
Arrested Anonymous activists just a small part of a long list
Even though the FBI started serving search warrants and arresting people suspected in participating in the Anonymous’ “Operation Payback” way back in …
Samba XSS and request forgery vulnerabilities
Two vulnerabilities have been reported in Samba, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks. 1. The Samba Web …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)