Google attacks linked to two Chinese schools
New findings regarding the origins of the January attacks on Google and some twenty other US corporations have come to light, and they point to two academic institutions in …
The state of healthcare privacy in the U.S.
FairWarning commissioned a national survey of healthcare providers. The majority of survey respondents were compliance, privacy or risk personnel, followed by IT management …
Cloud Security Alliance and IEEE join forces
The Cloud Security Alliance (CSA) and IEEE are joining forces to ensure that best practices and standards are developed and available to provide security assurance for cloud …
Get Backup: Free Mac backup software
Important aspects of your life are stored within the data on your computer, the loss of which can turn into a nightmare. To protect yourself from hard drive crash or human …
1Password coming to the iPad
1Password is the de facto choice for password safekeeping on the Mac. While there’s an iPhone application that complements the desktop version, the makers of this tool …
Botnets, the ever-present threat
Every day, the M86′ Security Labs analyzes over 7 million distinct email messages, looking for patterns and emerging trends. In their recently published report covering …
Spybot.AKB worm spreads across P2P networks and e-mail
PandaLabs detected a new worm, Spybot.AKB, which spreads using P2P programs (copying itself to the usual shared folders with different names) and also via e-mail. What’s …
Massive ZeuS compromise discovered
NetWitness analysts have discovered a dangerous new ZeuS botnet affecting 75,000 systems in 2,500 organizations around the world. The newly-discovered infestation, dubbed the …
Imminent flood of smartphone malware?
As this year’s Mobile World Congress held in Barcelona, Spain, is coming to an end, a few important players in the security industry shared their thoughts about the …
Man gets 309 years in prison for identity theft
Robert Thompson, the leader of a massive identity theft and bribery scheme, was sentenced to 309 years in prison based on charges of conspiracy, wire fraud, mail fraud, bank …
Video: Cyber attack simulation
In the video below you can watch CNN’s Jeanne Meserve reports on the results a staged cyber attack.
Spam recycling: Why fix it if it ain’t broken?
Why take the trouble and waste the time for writing a new email, when the first one did so well? In the latest spam campaign hitting inboxes around the world, cyber criminals …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)