GDPR requirements: Five high-priority actions
The European General Data Protection Regulation (GDPR) will have a global impact when it goes into effect on May 25, 2018. Gartner predicts that by the end of 2018, more than …
More and more apps equipped with ultrasonic tracking capability
Researchers have found 234 Android applications that are constantly listening for ultrasonic beacons in the background, allowing companies to track users’ current …
Brands increasingly targeted by false websites and phishing
DomainTools released the names of the top U.S.-based retail companies whose brands are frequently abused by criminals creating look-alike domains for phishing. The research …
Malware Hunter: Find C&C servers for botnets
Recorded Future and Shodan released Malware Hunter, a specialized crawler for security researchers that explores the Internet to find computers acting as remote access trojan …
Container Health Index: Red Hat’s standard for trusted containers
Red Hat introduced the Container Health Index, which provides a comprehensive image detail of any enterprise container service. The index grades all of Red Hat’s containerized …
Super Free Music Player is the latest malware on Google Play
Another day, another piece of malware lurking on Google Play, masquerading as a free and helpful app. This time it’s called “Super Free Music Player” and is …
DDoS attacks: $100,000 per hour is at risk during peak revenue generation periods
Neustar and Harris Interactive conducted global, independent research of 1,010 directors, managers, CISOs, CSOs, CTOs, and other c-suite executives to find out how DDoS …
Retina-X admits they have suffered a data breach
Retina-X Studios, the makers of several consumer-grade monitoring products, have finally announced that they have suffered a data breach. Retina-X and FlexiSpy, another …
Dok Mac malware intercepts victims’ web traffic, installs backdoor
A new piece of Mac malware, more insidious and dangerous that all those encountered before, has been flung at European users via fake (but relatively convincing) emails. In …
200 million financial services records breached in 2016, 900% increase from 2015
The financial services industry was attacked more than any other industry in 2016 – 65 percent more than the average organization across all industries, according to the IBM …
Windows 10 adoption is accelerating, many concerns remain
The vast majority of IT organizations (91%) have installed Windows 10, but there is still great variation in the current level of Windows 10 adoption, according to a new …
Week in review: Lure10 attack, DoublePulsar exploit proliferation
Here’s an overview of some of last week’s most interesting news and articles: BrickerBot bricked 2 million IoT devices, its author claims The author of BrickerBot, …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services