Thor’s Microsoft Security Bible
Thor’s Microsoft Security Bible provides a “one-stop-shop” for Microsoft-related security techniques and procedures as applied to the typical deployment of a …
Malicious fake Firefox update spam run
Fake notices about a Firefox update are again targeting the browser’s users, says Sophos. A rather plain message supposedly coming from Mozilla instructs users to follow …
Big corporations “hacked” in Defcon social engineering contest
Most of the recent high-profile cyber attacks against corporations and government organizations have one thing in common – they all started with a successful social …
SMS spying Android Trojan triggered by keywords
Another week, another trojanized Android app. And, according to Trend Micro researchers, this one has a functionality that differentiates it from similar previous ones: it …
Anonymous dumps US law enforcement, Brazil’s Federal Police data, hacks Syrian MOD website
It has been another busy weekend for the AntiSec initiative. First Anonymous and LulzSec released a 10GB data dump consisting of the information pilfered from the servers of …
Annual cost of cybercrime highlights need for governance
ISACA commends the Ponemon Institute’s latest “Cost of cybercrime” report for the detail it provides on the indirect costs of IT security attacks, as well as …
“Fidel Castro died” spam run leads to malware
Malware pushers have never balked from using news about a celebrity’s death to trick people into downloading malicious payloads. They also have no problem with faking …
The privacy officer’s agenda according to Gartner
Data breaches, cloud computing, location-based services and regulatory changes will force virtually all organizations to review, and at least half of all organizations to also …
Assessing the security of cloud providers
The Cloud Security Alliance announced the launch of a new initiative to encourage transparency of security practices within cloud providers. The CSA Security, Trust & …
Week in review: Mobile drive-bys, Facebook bug bounty and Operation Shady RAT
Here’s an overview of some of last week’s most interesting news and articles: Facebook introduces bug bounty program Facebook has decided to follow in …
Was your company one of the targets of Operation Shady RAT?
“I divide the entire set of Fortune Global 2000 firms into two categories: those that know they’ve been compromised and those that don’t yet know,” …
July 2011 threat landscape
July has been a hot month for SEO poisoning, and its popularity is expected to continue in August, says GFI. Users to be cautious of likely search term targets for scammers, …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous