Security information and event management tips
As organizations continue to collect, process and store larger amounts of data from an increasing number of sources, costs related to system and staff resources are soaring. …
The secure coding practices quick reference guide
In the video below, Keith Turpin talks about the secure coding practices quick reference guide. It’s a technology agnostic set of general software security coding …
Man makes career out of suing e-mail spammers
There may be a lot people who thought about it, but there is one who decided to actually do it – Daniel Balsam from San Francisco quit his job and started his new …
Multiple vulnerabilities in IBM Lotus Mobile Connect
A weakness and two vulnerabilities have been reported in IBM Lotus Mobile Connect, according to Secunia. These can be exploited by malicious people with physical access to …
Carders.cc, Exploit-db.org and others hacked on Christmas
Waking up on Christmas morning and finding out you’ve been hacked must be pretty annoying, and that it what happened to the administrators of Carders.cc – an …
The security landscape from 2010 to 2011
Vendor-neutral testing and certification firm ICSA Labs offers its thoughts on the security landscape spanning 2010 and 2011. Mobile security 1. While most hackers heavily …
Week in review: DDoS attacks, anti-Facebook worm and identity in the digital age
Here’s an overview of some of last week’s most interesting news, interviews, videos, reviews and articles: How to keep mobile devices secure while traveling …
Banknotes of the future?
There may come a time when banknotes will disappear altogether, but that time hasn’t come yet. The criminal practice of counterfeiting money has existed as long as money …
Inclement weather resurrects the “friend in need” scam
This recent spat of snowy weather has grounded may planes and stranded many passengers in Europe. It has also prompted scammers to resurrect en masse the tried and true friend …
Oracle VM VirtualBox 4.0 released
Oracle VM VirtualBox enables desktop or laptop computers to run multiple operating systems simultaneously, and supports a variety of host operating systems, including Windows, …
“American guy must be stoned to death” Facebook scam spreads virally
The latest scam spreading virally on Facebook snares people by making them wonder why This American GUY must be Stoned to De@th for doing this to a GIRL: [LINK] or why This …
Hacker recovers stolen computer and gets criminal caught
In this video recorded at DEFCON, a hacker has his computer stolen, and tells the story of how he recovered it and got the criminal caught. Although the story is quite …
Featured news
Resources
Don't miss
- Windows 10: How to get security updates for free until 2026
- XBOW’s AI reached the top ranks on HackerOne, and now it has $75M to scale up
- Why the SOC needs its “Moneyball” moment
- From posture to prioritization: The shift toward unified runtime platforms
- Why should companies or organizations convert to FIDO security keys?