Consensus IT security metrics
The Center for Internet Security (CIS) announced an updated release of its CIS Metrics, the industry’s first consensus metrics for information security. The release …
Fake Twitter warnings lure users to potentially malicious site
Twitter users are often targeted with various fake messages purportedly coming from the microblogging service, and these e-mails usually try to trick the users into clicking …
New vulnerability impacts Internet Explorer users
Microsoft is investigating new, public reports of a vulnerability in all supported versions of Internet Explorer. The main impact of the vulnerability is remote code …
Popular online services graded on SSL implementation
It seems that Firesheep has succeeded where similar tools have failed in the past: the issue of full end-to-end encryption for all websites – especially the most popular …
Perverted Facebook hacker targeted women
The recent arrest of a 23-year-old California man that has allegedly hacked e-mail accounts of more than 170 women and posted sexually explicit pictures found within them to …
New deep packet analysis technology
NetScout Systems announced Adaptive Session Intelligence (ASI) technology, a transformative real-time Deep Packet Analysis (DPA) engine that allows both enterprises and …
Google Android vulnerabilities
A shocking number of high-risk security flaws in Google’s Android smartphone OS have recently been discovered by security firm Coverity. “We found 88 high-risk …
Fake USAA e-mails phishing for card information
E-mails purportedly sent by the United States Automobile Association (USAA) have been hitting inboxes in the last few days, M86 researchers warn. In it, the recipients are …
Measure, visualize and understand WLAN clients
AirMagnet released n (including the AirMagnet Planner module) and AirMagnet WiFi Analyzer PRO 9.0. Both products now include the company’s new multi-adapter solution, …
End-to-end data security
RSA announced its RSA Data Protection Manager product which combines tokenization and application encryption, two popular application-based controls, with advanced token and …
Human rights organization targeted with cyber attack
The website of Survival International – a human rights organization that campaigns for the rights of indigenous tribal peoples – has been knocked offline last week …
The aftermath of the Bredolab botnet shutdown
The war against botnets will be long and hard – there is no doubt about it. For one thing, command and control centers can be replaced and the targeted botnet …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous