Please turn on your JavaScript for this page to function normally.
Google updates reCAPTCHA, makes things easier for users

Google aims to make life easier for its users and more difficult for botmasters with the introduction of the updated reCAPTCHA tool. The announcement was made on Friday by …

UK man indicted for hacking US govt networks, stealing confidential data

The New Jersey U.S. Attorney’s Office has charged an alleged hacker in the United Kingdom with breaching thousands of computer systems in the United States and elsewhere …

Buffer hacked, customer accounts misused to send out spam

Buffer, the popular online service for managing one’s social media presence by scheduling posts on Twitter, Facebook and LinkedIn, has announced on Saturday that they …

Researchers sinkhole several Cryptolocker C&Cs

The cyber crooks behind Cryptolocker, one of the latest ransomware threats, are having much success in infecting PC users with the deadly malware, but whether the victims fork …

Characteristics of effective security leaders

A new IBM study of security leaders reveals that they are increasingly being called upon to address board-level security concerns and as a result are becoming a more strategic …

Traditional security models becoming exhausted

The Nexus of Forces is transforming the approach towards information security as new requirements are brought about by social, mobile, cloud and information. Gartner predicts …

Protect data before sending it to the cloud

IBM inventors have developed a technique for protecting sensitive data prior to transmitting it to the cloud. The patented invention will overcome barriers to client adoption …

IPS still mainly deployed at the perimeter, doing a good job

SANS announced the results of a new survey on network security sponsored by HP. 439 survey responses show that IPS is still mainly deployed at the perimeter and is doing a …

Week in review: PHP.net compromise, Facebook data mining, and how to social engineer a social network

Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: The Basics of Web Hacking: Tools and Techniques to Attack the Web …

Bypassing security scanners by changing the system language

A substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that a computer system can be set up to …

WordPress 3.7 delivers important architectural updates

WordPress 3.7, named Basie, is available for download or update in your WordPress dashboard. Updates include: Updates while you sleep: With WordPress 3.7, you don’t have …

Mozilla releases add-on to reveal online data tracking

With a new version (1.0.2) released on Wednesday, Mozilla has once again put the spotlight on its Collusion add-on that aims to show users which first and third parties are …

Don't miss

Cybersecurity news