Please turn on your JavaScript for this page to function normally.
Week in review: Stratfor breach, brute-forcing WAPs and an analysis of Facebook attacks

Here’s an overview of some of last week’s most interesting news: What’s in store for us in 2012 Looking forward into what lies ahead for us in 2012, Zscaler …

Week in review: Mobile application security risks, holiday-themed scams, and reasons for ditching Java

Here’s an overview of some of last week’s most interesting news and podcasts: Windows 8 will have picture password sign in As much as security experts would like …

Week in review: Multiple dimensions of corporate espionage, 2012 biggest security threats, and avoiding malware behind QR codes

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Rise of unencrypted cards 71 percent of merchants were found to store …

Week in review: Facebook bug gives access to private photos, zero-day exploited in ongoing attacks, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, articles and interviews: IT pros can’t resist peeking at privileged information IT security …

Week in review: The Carrier IQ issue, how cyber attackers think, and the problem with malware metrics

Here’s an overview of some of last week’s most interesting news and podcasts: Anonymous bloggers in danger of being exposed You’re a blogger who, for …

Week in review: Rogue web browsers, the most vulnerable smartphones, and secure practices for online shopping

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Secure practices for online shopping These simple steps apply to everyone …

Week in review: Apple OS X sandbox hole, hiding messages in VoIP packets and U.S. water utility attack

Here’s an overview of some of last week’s most interesting news, podcasts, interviews and reviews Apple OS X sandbox hole allows bypassing of restrictions …

Week in review: Cell phone money laundering, hardware Trojans and iOS flaw that allows downloading of malicious code

Here’s an overview of some of last week’s most interesting news and articles: Browser bloat and privacy concerns An increase in browser-based bloat and malware, …

Week in review: Study of hacker forums, creating effective CAPTCHAs, and trust relocated for yet another CA

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Irresponsible IT disposal methods Although data security is the …

Week in review: U.S. government satellites hacked, Halloween threats and the m00p gang investigation

Here’s an overview of some of last week’s most interesting new, podcasts and articles: Microsoft puts vulnerability exploitation into context Recently Microsoft …

Week in review: 250,000 hacker conversations analyzed, making a cheap mobile malware jail and Stuxnet’s successor Duqu

Here’s an overview of some of last week’s most interesting news, articles, interviews and podcasts: Testing web applications for security flaws David Hoelzer is …

Week in review: Trojanized Netflix app, new Sony attack and German government’s Trojan/backdoor

Here’s an overview of some of last week’s most interesting news, articles and photos: Most social networks users don’t keep up with privacy settings changes …

Don't miss

Cybersecurity news