Are malware hybrids the next big threat?
Recent encounters with hybridized malware files have left Trend Micro researchers wondering if they have been designed that way or if they are just an undesirable side effect …
Security, privacy and the generation gap
In the video below, Bruce Schneier talks about social networking sites and the future of privacy at the HEAnet National Networking Conference 2010 in Ireland.
Apple releases iOS 4.2
iOS 4.2 is available for download for iPad, iPhone and iPod touch. iOS 4.2 brings over 100 new features from iOS 4.0, 4.1 and 4.2 to iPad including Multitasking, Folders, …
10 tips for securely managing e-mail
“As an IT manager, looking after your company email can be a major headache. Being one of the primary portals for security threats and other IT issues, it is vital that …
Corporate laptops unprotected against theft or data loss
Over half of UK public and private sector organizations are at risk of data breaches, losses and leaks from portable PCs and devices, according to Check Point. A total of 52% …
NetBSD 5.1 released, security fixes abound
NetBSD 5.1 represents a selected subset of fixes deemed critical for security or stability reasons, as well as new features and enhancements. Security advisory fixes: …
Agnitio: Security code review tool
Agnitio is an application security tool developed by David Rook to help further the adoption of the Principles of Secure Development and to bring more repeatability and …
Week in review: Cybercrime victims, PayPal phishing and Moxie Marlinspike
Here’s an overview of some of last week’s most interesting news and interviews: Top 10 security threats for 2011 Imperva announced their predictions for the top …
Will the DHS receive authority over private sector networks?
A bill that would give the U.S. Department of Homeland Security the power to impose federal cybersecurity standards on private sector companies whose flawless functioning is …
New type of ATM skimming attacks
ATMs in Europe have lately been hit with skimming attacks that are not only effective, but also rather brazen – the criminals have taken to reprogramming the …
Sweden to issue international arrest warrant for Wikileaks’ spokesman
A month after he’s been denied a Swedish residence and work permit – most likely because of the rape and molestation accusations that have been been brought up …
Whitehat hacker’s laptop, cellphones seized and searched
The well-known whitehat hacker and security researcher that goes by the handle Moxie Marlinspike has recently experienced firsthand the electronical device search that …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous