Gawker Media breach claimed by Gnosis
The credit for the breach of Gawker Media has been claimed by a group that goes by the name of Gnosis, and was apparently a way to get back at the company, its staff and its …
Data privacy a primary concern in the smart grid world
Privacy has emerged as the number one concern related to data security and management, with data governance as an emerging concern, according to IDC Energy Insights. As …
Data protection compliance in the EU administration
The European Data Protection Supervisor (EDPS) adopted a policy paper that sets out the framework within which he monitors, measures and ensures data protection compliance in …
Malware spread via Google, Microsoft ad network
A number of online ad networks – including the two largest, Google’s DoubleClick and Microsoft’s Media Network – have been found unknowingly spreading …
Gawker Media data breach linked to Twitter spam campaign
A recent security breach at Gawker Media which involved the leaking of user passwords for sites such as Gizmodo and Lifehacker, has now been linked to a widespread spam …
Multiple vulnerabilities in RealPlayer
Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user’s system, according to Secunia. Users should …
McDonald’s customer data compromised
If you previously elected to submit information to McDonald’s in connection with one of their websites or promotions, there is a possibility that information you …
Week in review: Assange arrested, 2011 threat landscape and first VoIP call from space
Here’s an overview of some of last week’s most interesting news and articles: McAfee’s Secure Short URL Service not so secure M86 Security Labs’ …
Security, is there an app for that?
Smartphones are now an essential tool across all sections of society, from top government officials to businesses and consumers. If you are one of the hundreds of millions of …
Operation Payback picks up speed, WikiLeaks denies involvement
The WikiLeaks saga continues. As Julian Assange spends his time in the segregation unit of Wandsworth prison, hoping that his lawyers will be able to reverse the court’s …
Underground toolkits will make cyber espionage easy
With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic …
Advanced iPhone spy application
Mobistealth launched an advanced iPhone spy application which can be installed on any iPhone and runs completely in the background. The application is virtually undetectable …
Featured news
Resources
Don't miss
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine
- Stop settling for check-the-box cybersecurity policies
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)