Red Hat launches Ansible-native container workflow project
Red Hat launched Ansible Container under the Ansible project, which provides a simple, powerful, and agentless open source IT automation framework. Available now as a …
Bloatware-be-gone refresh tool added to Windows 10
In the latest test build of Windows 10 Anniversary Update released last week, Microsoft has introduced a tool that allows users to get rid of bloatware and crapware with one …
GoToMyPC remote desktop service resets all passwords in wake of attack
GoToMyPC, a remote computer administration service offered by Citrix, has forced a password reset for all customers in the wake of what they call a “very sophisticated …
Hyperconverged infrastructure adoption is accelerating
The hyperconverged infrastructure is increasingly being adopted by enterprise and midmarket companies to reduce data center costs and improve operational efficiency, according …
Week in review: Smart TV ransomware, DNC hack, and DAO under attack
Here’s an overview of some of last week’s most interesting news and articles: Ransomware targets Android smart TVs If you own a Sharp and Philips smart TV running …
The DAO is under attack, a third of its ether reserves stolen
The DAO, a digital Decentralised Autonomous Organisation that has been set up to support projects related to Ethereum, a public blockchain platform that allows programmable …
50% of ads on free livestreaming websites are malicious
Millions of people use free livestreaming websites to watch sports and other live events online, but this comes with a considerable security risk. Researchers from KU …
GitHub accounts compromised in wake of reused password attack
Three days ago, an unknown attacker has been spotted trying to break into a large number of GitHub accounts and has managed to access some of them, Shawn Davenport, Vice …
Top 10 technologies for information security and their implications
Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2016. “Information security teams and …
Get ready for a surge in online travel fraud
Unsurprisingly, transactions for booking flights, hotels and rental cars increase significantly over the summer months. In addition, fraudulent activity against online travel …
Assess, build and improve security culture with CLTRe
Norwegian security startup CLTRe announced a new product series, enhancing its existing Saas offering, the Security Culture Toolkit. This new range consists of CLTRe Control, …
Fix for actively exploited Flash Player 0day is out, patch ASAP!
Adobe has issued a patch for the Plash Player zero-day vulnerability (CVE-2016-4171) that is actively exploited by the ScarCruft APT group. The bug, discovered by Anton Ivanov …
Featured news
Resources
Don't miss
- OPNsense 26.1 brings updates to open-source firewall management
- WinRAR vulnerability still a go-to tool for hackers, Mandiant warns
- CERT UEFI Parser: Open-source tool exposes UEFI architecture to uncover vulnerabilities
- Why prevention-first secrets security will define enterprise scale: Learnings from a leading telecom
- Fortinet starts patching exploited FortiCloud SSO zero-day (CVE-2026-24858)