Week in review
Week in review: “Frankenmalware”, Kelihos malware author revealed, and the tragic state of SCADA security
Here’s an overview of some of last week’s most interesting news: Tool used in Anonymous Megaupload campaign Looking at the LOIC downloads so far this year, …
Week in review: Zappos, Symantec breaches, identities of Koobface gang revealed, and Megaupload shutdown
Here’s an overview of some of last week’s most interesting news and podcasts: Google Docs hosted phishing schemes abound Sophos has recently spotted two distinct …
Week in review: Currency rounding attacks, Trustworthy Computing Initiative anniversary, and how to foil targeted attacks
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Most unusual laptop recovery stories From the good, the bad, and …
Week in review: Leaked Symantec code, the grayware problem, and securing Android for the enterprise
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Hackers aim to fight Internet censorship with own communication …
Week in review: Stratfor breach, brute-forcing WAPs and an analysis of Facebook attacks
Here’s an overview of some of last week’s most interesting news: What’s in store for us in 2012 Looking forward into what lies ahead for us in 2012, Zscaler …
Week in review: Mobile application security risks, holiday-themed scams, and reasons for ditching Java
Here’s an overview of some of last week’s most interesting news and podcasts: Windows 8 will have picture password sign in As much as security experts would like …
Week in review: Multiple dimensions of corporate espionage, 2012 biggest security threats, and avoiding malware behind QR codes
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Rise of unencrypted cards 71 percent of merchants were found to store …
Week in review: Facebook bug gives access to private photos, zero-day exploited in ongoing attacks, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and interviews: IT pros can’t resist peeking at privileged information IT security …
Week in review: The Carrier IQ issue, how cyber attackers think, and the problem with malware metrics
Here’s an overview of some of last week’s most interesting news and podcasts: Anonymous bloggers in danger of being exposed You’re a blogger who, for …
Week in review: Rogue web browsers, the most vulnerable smartphones, and secure practices for online shopping
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Secure practices for online shopping These simple steps apply to everyone …
Week in review: Apple OS X sandbox hole, hiding messages in VoIP packets and U.S. water utility attack
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and reviews Apple OS X sandbox hole allows bypassing of restrictions …
Week in review: Cell phone money laundering, hardware Trojans and iOS flaw that allows downloading of malicious code
Here’s an overview of some of last week’s most interesting news and articles: Browser bloat and privacy concerns An increase in browser-based bloat and malware, …
Featured news
Resources
Don't miss
- Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825)
- Building a reasonable cyber defense program
- Attackers are probing Palo Alto Networks GlobalProtect portals
- Why global tensions are a cybersecurity problem for every business
- How to build an effective cybersecurity simulation