Please turn on your JavaScript for this page to function normally.
Microsoft accessed Hotmail account to uncover internal leaker

This week’s charging of a former Microsoft employee for stealing the company’s trade secrets could have passed almost unnoticed were it not for an important detail …

IBM launches new software and consulting services

IBM introduced new software and services to help organizations use Big Data and Analytics to address the $3.5 trillion lost each year to fraud and financial crimes. Through …

Webcast: Beware of the Wild Wild Web

The World Wide Web is wasteland brimming with uncontrolled threats and dangers to IT security. Network and IT managers can prevent those threats from causing damage by …

BlackOS malicious web traffic managing software is on sale

Security researchers are keeping a close eye on underground cybercrime forums and are quick to spot new offerings, such as the BlackOS software package. Not to be confused …

US tech firms knew about and assisted with PRISM data collection

In a testimony before the Privacy and Civil Liberties Oversight Board, the NSA general council Rajesh De and his colleague stated on Wednesday that the tech companies that …

Over 31,000 IoT devices and computers infected by cryptocoin-mining worm

A new version of the Darlloz Linux worm, which targets Internet-enabled devices such as home routers and security cameras, computers running Intel x86 architectures as well as …

Oracle releases Java 8

Oracle has released Java Standard Edition (SE) 8, Java Development Kit (JDK) 8, and Java Runtime Environment (JRE) 8. The new releases work on Windows 8, Windows 7, Windows …

Product pitch: DigiCert Certificate Inspector

SSL Certificates serve as the security backbone of the internet, securing billions of interactions annually. Yet, too often, system administrators fail to properly configure …

Operation dismantles child exploitation enterprise on Tor network

DHS Secretary Jeh Johnson highlighted the complete results of one of the largest online child exploitation investigations in the history of ICE, involving victims in 39 states …

Tor warns of malicious Tor browser offered on the App Store

A public plea made on Twitter by Runa A. Sandvik, a (former?) developer with The Tor Project has turned the spotlight on a still unresolved issue of an apparently fake Tor …

Full Disclosure mailing list closure elicits mixed reactions

The Full Disclosure mailing list has long been the perfect place for security researchers to disclose and discuss newly found vulnerabilities. But John Cartwright, one of its …

Fake Malaysia Airlines Flight 370 video hides a backdoor

As the search for the missing Malaysia Airlines Flight 370 nears the end of the second week, cyber crooks are diversifying the attacks against users curious to know what …

Don't miss

Cybersecurity news