Sony hack: Lousy security, customized malware linked to previous attacks
The security picture painted by the stolen and leaked documents from Sony Pictures Entertainment becomes uglier by the day, as several companies and news outlets continue to …
Bebe Stores latest victim of a payment card breach
Another big US-based has suffered a card data breach. According to information initially gathered by Brian Krebs and several banks, Bebe Stores – a women’s retail …
RFID forensic evidence management
Radio frequency identification (RFID) tags—devices that can transmit data over short distances to identify objects, animals or people—have become increasingly popular for …
US DOJ announces creation of a Cybersecurity Unit
The US Department of Justice has announced the creation of a new unit within its Criminal Division: the Cybersecurity Unit. “The Cybersecurity Unit will have …
Complicated password rules diminish online shopping convenience
The holiday shopping season is now fully underway, but the online shopping splurge is not over yet. Over half of Europeans plan to buy their gifts online, yet many are …
Key trends in online spending
ThreatMetrix identified several key trends in online spending over the holiday weekend. Mobile represented nearly 40 percent of all transactions Throughout Cyber Week this …
Microsoft to patch three critical issues
December’s advanced Patch Tuesday brings us seven advisories, three of which are listed as Critical. The Critical issues affect, Internet Explorer, all supported …
Health insurance online threats revealed
Websites hosted by external providers, excessive mobile app permissions and third party code libraries represent the biggest risks to users of health insurance web and mobile …
Pre-loaded malware on new Android phones is on the rise
The danger of having your Android handset come preloaded with malware is rising, especially if you live in Asia and Africa and are on the market for a cheap, low-level phone. …
Researchers analyze destructive malware used in Sony hack
Who is behind the Sony Pictures Entertainment hack, and how extensive is it? These are two questions to which we still don’t know the answers, but new leaks and hints …
Internet of Things predictions for 2015
IDC provides organizations with insight and perspective on long-term industry trends along with new themes that may be on the horizon. IoT and the cloud. Within the next five …
Best practices in knowledge-based authentication
Knowledge-based authentication (KBA) is a methodology gaining increasing recognition for providing the identity proofing part of user authentication. A group of senior IT pros …
Featured news
Resources
Don't miss
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner
- Bitdefender PHASR: Proactive hardening demo overview
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)