Security recommendations to prevent cyber intrusions
Cyber thieves, hacktivists, pranksters, nation-states, and malicious coders for hire all pose serious threats to the security of both government and private sector networks. A …
Internet activist charged with hacking, theft of millions of digital documents
24-year-old Aaron Swartz, renowned programmer and Internet activist, stands accused of having stolen over 4 million digital documents from MIT’s JSTOR archive with the …
Apple releases Mac OS X Lion
Apple released Mac OS X Lion (v10.7), which takes some of the best ideas from iPad and brings them back to the Mac. Security-wise, Lion brings an improvement to Address space …
How to secure patient records on mobile devices
Mobile devices have become as common as the stethoscope in patient’s rooms. Physicians routinely review patients’ electronic health records (EHR), read test …
Google warns users about active malware infection
Google has begun notifying its users that a particular piece of malware is installed on their computers by showing a big yellow notification above their search results (click …
16 arrested for Anonymous-branded cyber attacks
Fourteen individuals were arrested on Monday by FBI agents on charges related to their alleged involvement in a cyber attack on PayPal’s website as part of an action …
Android malware trends
Could it be that 2011 is the year when the long-standing predictions about the rise of mobile malware come true? Symantec’s Irfan Asrar thinks that there are definite …
Santander customers targeted with clever phishing scam
Brazilian customers of Santander, one of the largest banks in the world, have been targeted by a very clever phishing scam that did not involve clicking on malicious links in …
In the “speed vs. security” battle, speed still wins
The increasing number and severity of recent data breaches and cyber attacks have made one thing clear among major corporations and government entities: developing a strong …
A new approach to circumventing state-level Internet censorship
A group of researchers led by J. Alex Halderman, assistant professor of electrical engineering and computer science at the University of Michigan, have been working on a new …
U.S. military contractors targeted with malicious PDFs
The last few months have seen a lot of cyber attacks aimed at U.S. military contractors and they are still ongoing. F-Secure researchers have recently spotted an email …
LulzSec hacks News International servers, “kills” Murdoch
Hacktivist group LulzSec is back in business. It has added to the pressure put on Rupert Murdoch following the phone hacking scandal by hacking into News International …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?