Detecting the DNS Changer malware
January marked half-time for the folks at the DNS Changer Working Group (DCWG) who are now running the DNS servers originally used in the Rove botnet. Ever since a …
(IN)SECURE Magazine issue 33 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 33 has been released today. Table of contents: …
Romanian hacker TinKode allegedly arrested
A 20-year old Romanian believed to be “TinKode”, the infamous hacker that has breached the systems and defaced the pages of several government organizations, has …
Defense companies persistently targeted by cyber spies
Researchers from security companies Zscaler and Seculert have issued a warning about bogus emails targeting employees of defense-related organizations around the world in …
Fake Tumblr Staff Blog offers still targeting users
A week ago, compromised Tumblr accounts were sporting fake messages from a “Tumblr Staff Blog” offering Starbucks gift cards in return for completing surveys and …
Sophos wireless access point supports 5 GHz connections
Sophos announced the Astaro AP50, its new dual-band/dual-radio capable wireless access point. The new addition to Astaro’s wireless access point family supports both …
The Tangled Web: A Guide to Securing Modern Web Applications
Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application …
Counterclank: Info-stealing Trojan or advertising tool?
A couple of days ago, Symantec has warned about Counterclank, an Android Trojan that has been unknowingly installed by users on over five million devices. This huge number was …
Law firms get hacked for deal data
A successful cooperation between a law firm and its clients depends on the firm’s ability of keeping the details of these relationships confidential – something …
Compromised WordPress sites lead to Phoenix exploit kit
Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …
Greatest risks to database security
The greatest challenge to database security may actually come from organizational issues, rather than nefarious or accidental acts, according to a survey presented by …
The state of global cyber-readiness
McAfee and the Security and Defence Agenda (SDA) revealed the findings from a report that paints a global snapshot of current thinking about the cyber-threat and the measures …
Featured news
Resources
Don't miss
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform
- BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation