Week in review
Week in review: Multiple dimensions of corporate espionage, 2012 biggest security threats, and avoiding malware behind QR codes
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Rise of unencrypted cards 71 percent of merchants were found to store …
Week in review: Facebook bug gives access to private photos, zero-day exploited in ongoing attacks, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and interviews: IT pros can’t resist peeking at privileged information IT security …
Week in review: The Carrier IQ issue, how cyber attackers think, and the problem with malware metrics
Here’s an overview of some of last week’s most interesting news and podcasts: Anonymous bloggers in danger of being exposed You’re a blogger who, for …
Week in review: Rogue web browsers, the most vulnerable smartphones, and secure practices for online shopping
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Secure practices for online shopping These simple steps apply to everyone …
Week in review: Apple OS X sandbox hole, hiding messages in VoIP packets and U.S. water utility attack
Here’s an overview of some of last week’s most interesting news, podcasts, interviews and reviews Apple OS X sandbox hole allows bypassing of restrictions …
Week in review: Cell phone money laundering, hardware Trojans and iOS flaw that allows downloading of malicious code
Here’s an overview of some of last week’s most interesting news and articles: Browser bloat and privacy concerns An increase in browser-based bloat and malware, …
Week in review: Study of hacker forums, creating effective CAPTCHAs, and trust relocated for yet another CA
Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Irresponsible IT disposal methods Although data security is the …
Week in review: U.S. government satellites hacked, Halloween threats and the m00p gang investigation
Here’s an overview of some of last week’s most interesting new, podcasts and articles: Microsoft puts vulnerability exploitation into context Recently Microsoft …
Week in review: 250,000 hacker conversations analyzed, making a cheap mobile malware jail and Stuxnet’s successor Duqu
Here’s an overview of some of last week’s most interesting news, articles, interviews and podcasts: Testing web applications for security flaws David Hoelzer is …
Week in review: Trojanized Netflix app, new Sony attack and German government’s Trojan/backdoor
Here’s an overview of some of last week’s most interesting news, articles and photos: Most social networks users don’t keep up with privacy settings changes …
Week in review: Patching strategies, HTC Android privacy flaw, and how well do you know SSL?
Here’s an overview of some of last week’s most interesting news, videos, articles and podcasts: Serious disconnect between security perceptions and reality The …
Week in review: Mysql.com hack, QR codes leading to malware and Facebook fixes post-logout tracking cookie
Here’s an overview of some of last week’s most interesting news, interviews, podcasts and articles: Facebook changes raise serious security concerns The last few …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility