Week in review: How GitHub is redefining software development, Glibc bug, drone-hijacking malware
Here’s an overview of some of last week’s most interesting news, interviews and articles: VPN services blocked by China’s Great Firewall A number of popular …
Researchers show how easy it is to de-anonymize shoppers
The fact that anonymising large sets of data is very, very hard should be widely known by now, as a number of researchers have already successfully de-anonymized a variety of …
Reddit released its first transparency report
Reddit, the popular social news site/message board styled “the front page of the internet”, has released its first transparency report. As it turns out, in 2014 …
Nearly half of all DDoS attacks use multiple attack vectors
Akamai released a new security report that provides analysis and insight into the global attack threat landscape including DDoS attacks. Akamai observed a 52 percent increase …
How to determine if insiders should be your primary concern
We learned throughout our lives that if we experience the same problem over and over again in a certain situation, we should probably change something in our own behavior / …
How people perceive online privacy
A new study by the National Cyber Security Alliance shows that Americans care deeply about their privacy. While a great knowledge gap exists about how information is collected …
What IT workplace issues keep CIOs awake at night?
What worries chief information officers (CIOs) and IT professionals the most? According to a recent survey by Sungard AS, downtime and talent acquisition weigh heaviest on …
Canada’s spy agency monitors file downloads around the world
After NSA whistleblower Edward Snowden shared the documents he exfiltrated from the agency with select journalists, the revelations that stemmed from them have mostly focused …
Email scammers stole $215M from businesses in 14 months
The Business E-mail Compromise scam is alive and well, and expected to rise both when it comes to the number of victims and the total money loss sustained by them. According …
Guidance to improve risk management and IoT
As connected devices infiltrate the workplace—some with IT’s knowledge and some without—both value and risk can increase significantly. ISACA has released new guidance …
How much can a DDoS attack cost your organization?
A DDoS attack on a company’s online resources might cause considerable losses – with average figures ranging from $52,000 to $444,000 depending on the size of the …
D-Link routers vulnerable to DNS hijacking
At least one and likely more D-Link routers as well as those of other manufacturers using the same firmware are vulnerable to remote changing of DNS settings and, effectively, …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)