IE “Unicorn” bug actively exploited in the wild
Last week, in its regular Patch Tuesday, Microsoft patched a number of serious vulnerabilities, including one that is nearly two decades old, dating back to Microsoft IE 3.0. …
ITIL and ISO 20000 problem management
Remember this situation? You’re running Windows. The blue screen forces you to reboot your PC. And then it happens again. Incident Management = reboot your PC. And your …
Using company devices for personal activities leads to data loss
GFI Software released the findings of an independent study into how workers use company provided computers and laptops for personal activities, and the direct impact that …
6 tips for protecting your Internet-connected devices
While Internet-connected devices are our window on the world, we don’t realize that for cybercriminals it could be their window into ours if we don’t secure our …
Financial services cyber trends for 2015
If 2014 was the “year of the breach,” then what future cybersecurity threats await us? What’s the next mode of attack, and how much worse will it be? …
Detekt government surveillance spyware on your computer
Amnesty International, Digitale Gesellschaft, the Electronic Frontier Foundation and Privacy International have partnered to create and release a free and open source tool for …
Windows Kerberos bug: How to detect signs of exploitation before the update?
Microsoft has shared more details about the critical elevation of privilege bug found in Microsoft Windows Kerberos Key Distribution Center (CVE-2014-6324) which is being …
OpenDNS and IRISSCERT partner to fight security threats
OpenDNS announced a partnership with the Irish Reporting and Information Security Service (IRISSCERT), to provide threat intelligence about new and emerging threats. IRISSCERT …
Thousands fall for Free Audi R8 Facebook scam
Over 200,000 Facebook users have so far fallen prey to a like-farming scam promising two free Audi R8 cars, and thousands are joining the victim list each hour, according to …
New Citadel variant is after your master password
A good indication that the use of password managers has become a thing is the fact that cyber crooks are now trying to slurp up users’ master password for a number of …
8 cybercrime trends that will shape IT
Cybersecurity created headlines and headaches in 2014, with large-scale data breaches at retail chains, attacks on data stored in the cloud and massive vulnerabilities …
Most IT pros prefer open source to proprietary software
Business continuity and control eclipse cost savings are the top reasons why U.S. IT professionals prefer open source to proprietary software. According to a Ponemon Institute …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)