cybercrime
FBI affiliate organization hacked, user database leaked
Only a day after they leaked the details of over one million user accounts and various databases of Sony Pictures and some of its regional sites, LulzSec announced a …
Business continuity: You need more than just a plan
Stop for a moment and take a look around you – IT isn’t just the computer on your desk, the lap top in your bag or the mobile in your pocket. The truth is …
More US military contractors hit by cyber attacks
It seems that the floodgates have opened. Following the confirmed attack against Lockheed Martin‘s computer networks comes the news that two more US military contractors …
Data center IT departments fear targeted attacks
IT departments are now turning to virtualization, with half of the respondents having either implemented or are planning to deploy private clouds, according to a McAfee study. …
Spammers establish their own fake URL-shortening services
For the first time ever, spammers are establishing their own their own fake URL-shortening services to perform URL redirection, according to Symantec. This new spamming …
40% of IT staff could wreak havoc to your network
A survey showed that 40% of IT staff admit that they could hold their employers hostage – even after they’ve left for other employment – by making it …
The progress of IT threats in 2010
Cyber criminals have capitalized on the recent growth in popularity of the Android mobile platform. Based on the number of new mobile malware signatures detected during this …
Stolen credit card numbers advertised via Twitter
You would expect online criminals to want to keep a low profile and restrict their attempts of selling stolen wares to shady online criminal forums, but every once in a while …
HADOPI stops monitoring for copyright infringement due to breach
Trident Media Guard – the company tasked by the French High Authority for the Dissemination of Works and Protection of Rights on the Internet to monitor P2P networks and …
Breaches drive enterprises to prioritize access governance
Aveksa announced the findings of a recent survey conducted to examine how companies are re-evaluating their IT security measures following the recent security breaches at …
PSN attackers allegedly used Amazon cloud for attack
Attackers (mis)used the Amazon cloud to mount their attack against Sony’s online services and systems, and they did it legally, says Bloomberg. According to an unnamed …
Cyber criminals moving operations to Canada
Cyber criminals are on the move again and, this time, Canada is the prime target. IP addresses in China and Eastern Europe are highly scrutinized and undergoing intense …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA