Please turn on your JavaScript for this page to function normally.
Google starts blocking badly behaving Gmail extensions

How to deal with untrustworthy third-party add-ons that could endanger your own users? Prevent them from loading – if you can. That’s what Google recently did with …

Malware peddlers turn again to malicious links

In the continuous see-sawing that spammers and malware peddlers perform between sending out emails with malicious links and those with malicious attachments, the former method …

Researchers confirm multiple Google App Engine security sandbox bypasses

Polish firm Security Explorations, which announced last week that they found over 30 serious security issues in the Java security sandbox of the Google App Engine (GAE), has …

Sony hackers threaten company and movie-goers

Guardians of Peace, the hacker group that hit Sony Pictures Entertainment, has released another batch of data labeled simply with “Michael Lynton,” the name of the …

Sony details employee data compromised in GOP hack

After having disclosed the extent of the employees’ information stolen in the recent hack to the California Attorney General’s Office, Sony Pictures Entertainment …

Attackers worm their way into QNAP NAS devices through Shellshock hole

A worm intent on creating surreptitious backdoors is actively being used to compromise unpatched QNAP network-attached storage (NAS) systems around the world by exploiting the …

Help Google design the Open Web of Things

Do you have an idea how the Internet of Things should work? You might want to share it with Google. The internet giant has long had an interest in IoT technologies, but is …

100k+ WP websites compromised by SoakSoak malware

Sucuri Security researchers are warning about a massive compromise of WordPress sites sporting malicious JavaScript leading visitors to malware. The discovery was made on …

GOP hackers announce more Sony data leaks for Christmas

As the Guardians of Peace announced another explosive data leak for Christmas, Sony Pictures Entertainment got into incident minimization mode by sending out a message to news …

Two newcomers in the exploit kit market

Exploit kits are a great means to an end for malware distributors, who either buy them or rent them in order to widely disseminate their malicious wares. It’s no wonder …

Payment gateway provider breached

New Jersey-based Charge Anywhere, whose electronic payment gateway solutions route payment transactions from merchants’ Point-of-Sale (PoS) systems to their payment …

Cloud lock
CSA Guide to Cloud Computing

Authors: Raj Samani, Brian Honan, Jim Reavis Pages: 236 Publisher: Syngress ISBN: 0124201253 Introduction The title says it all: this is a book that will tell you what cloud …

Don't miss

Cybersecurity news