The Andromeda botnet is ballooning once again
Cybercriminals are, once again, trying to swell the number of computers compromised by the Andromeda backdoor. This will allow them to control the machines and download …
How Snowden’s revelations affected Americans’ communication habits and online activities
Nearly two years after news outlets started reporting on previously publicly unknown surveillance and data collection practices by the US NSA and its counterparts around the …
What pokes holes in virtual environments?
While most companies believe virtualization technology is a strategic priority, there are clear risks that need to be addressed. Ixia surveyed more than 430 targeted …
When it comes to cloud apps, companies are left in the dark
More than two-thirds (67 per cent) of organizations admit that unauthorized cloud applications are being implemented without IT’s knowledge or involvement, and …
Exploit kits in 2015: What can we expect?
Since 2006, when the earliest exploit kit (WebAttacker) was made available in the crimeware market, these hack toolkits have become one of the preferred ways for cybercrooks …
Microsoft releases EMET 5.2
Microsoft has released version 5.2 of its Enhanced Mitigation Experience Toolkit (EMET), a free utility that can detect and block exploitation techniques that are commonly …
Yahoo announces email encryption plugin, password-free logins
Yahoo email users will soon be able to encrypt the emails they send out by simply clicking on a button. In addition to this, users will be able to effectively forget their …
Students create open source, cross-platform memory scanning tool
Mozilla has unveiled the result of a successful project executed by a group of Computer Science students from Argentina: it’s called Masche, and it’s an open …
Cutting-edge security research comes to Amsterdam
Held once again at De Beurs van Berlage, HITB2015AMS takes place from the 26-29 May 2015 and runs alongside HITB Haxpo, a 3-day technology expo for hackers, makers, builders …
Online trust is at the breaking point
IT security professionals around the globe believe the system of trust established by cryptographic keys and digital certificates, as well as the security of trillions of …
Week in review: Shadow IT, crypto-ransomware goes after gamers, and the security of smartwatches
Here’s an overview of some of last week’s most interesting news and articles: Hack yourself first: How we can take the fight to the black hats Threats are no …
Facebook worm spreads by leveraging cloud services
Facebook users are in danger of having their computers turned in a bot by a worm that spreads via the social network. The worm, identified as belonging to the Kilim malware …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption