Microsoft plugs another Windows zero-day with emergency patch
Microsoft has released an emergency update that plugs a critical zero-day vulnerability (CVE-2015-2426) that affects all supported versions of Windows and could allow …
How gamers can help improve critical software security
There’s now a game where sophisticated gamers can help improve security of the country’s critical software. SRI International, in partnership with the University of …
Hardware encryption market revenue to reach $36.4 billion by end of 2015
There are a variety of ways to secure data, either on the perimeter or within the LAN, but the most fundamental method in a defense-in-depth model is hardware encryption. The …
Free tools for detecting Hacking Team malware in your systems
“Worried that you might have been targeted with Hacking Team spyware, but don’t know how to find out for sure? IT security firm Rook Security has released Milano, …
Hackers hit UCLA Health, access medical files of 4.5 million patients
UCLA Health, the administrative structure which governs the University of California, Los Angeles (UCLA) hospitals, has suffered a data breach, and personal and medical …
Ashley Madison hacked, info of 37 million users stolen
Popular online cheating site Ashley Madison has been hacked, and personal information and financial records of 37 million of its users has apparently been compromised by the …
UK High Court declares emergency surveillance bill unlawful
On Friday, the UK High Court has declared Data Retention and Investigatory Powers Act (DRIPA) unlawful.DRIPA is an emergency legislation signed into law in July 2014, and its …
Are IT pros overconfident in their ability to deflect attacks?
IT executives within critical infrastructure organizations see a need for public-private threat intelligence sharing partnerships (86% of respondents) to keep pace with …
Week in review: Emergency patches for actively exploited flaws, HTML5 can be used to hide malware
Here’s an overview of some of last week’s most interesting news, reviews and articles:First Java zero-day in two years exploited by Pawn Storm hackersThe flaw was …
Google Safe Browsing to start blocking sites with ads leading to unwanted software
Ad networks that don’t vet carefully what ads they serve will be the next “victims” of Google’s Safe Browsing service.Since August 2014, Google has …
School monitoring software’s hard-coded encryption key exposed
Impero Software is the creator and seller of “Impero Education Pro”, a piece of software that’s used in many UK schools to monitor school computers for …
Nearly all websites have serious security vulnerabilities
A new Acunetix report on 5,500 companies comprising 15,000 website and network scans, performed on over 1.9 million files, finds nearly half of the web applications scanned …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated